Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:49
Behavioral task
behavioral1
Sample
26ed049e395f11eddf32a3871d7cef40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26ed049e395f11eddf32a3871d7cef40.exe
Resource
win10v2004-20231215-en
General
-
Target
26ed049e395f11eddf32a3871d7cef40.exe
-
Size
1.5MB
-
MD5
26ed049e395f11eddf32a3871d7cef40
-
SHA1
9ab265a72b217c107e5dcb8d144945caad83649c
-
SHA256
610f48d0a3be3d270bef07c42e92690a7b922d39995c49d3fbc17d42ee6fe46b
-
SHA512
f82533e5d327c93cb3c63287c55813e359ce813a1e00d0938f0ce5440da254c67cbf4e13a29b84d24df495043f105a65dc3f69300ed03841e2d6e66fcf2c3f8e
-
SSDEEP
24576:dWgWhlahPGzjpBwYV5E8kDt5dRmBnniDpNYzX+1o3sjemYSyuZldW:pWhchezKhYBnnSpmr+1blUuR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 26ed049e395f11eddf32a3871d7cef40.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 26ed049e395f11eddf32a3871d7cef40.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 26ed049e395f11eddf32a3871d7cef40.exe -
resource yara_rule behavioral1/memory/1980-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2708-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b00000001224c-13.dat upx behavioral1/files/0x000b00000001224c-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1980 26ed049e395f11eddf32a3871d7cef40.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1980 26ed049e395f11eddf32a3871d7cef40.exe 2708 26ed049e395f11eddf32a3871d7cef40.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2708 1980 26ed049e395f11eddf32a3871d7cef40.exe 28 PID 1980 wrote to memory of 2708 1980 26ed049e395f11eddf32a3871d7cef40.exe 28 PID 1980 wrote to memory of 2708 1980 26ed049e395f11eddf32a3871d7cef40.exe 28 PID 1980 wrote to memory of 2708 1980 26ed049e395f11eddf32a3871d7cef40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ed049e395f11eddf32a3871d7cef40.exe"C:\Users\Admin\AppData\Local\Temp\26ed049e395f11eddf32a3871d7cef40.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\26ed049e395f11eddf32a3871d7cef40.exeC:\Users\Admin\AppData\Local\Temp\26ed049e395f11eddf32a3871d7cef40.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54906f3e47c222b15f00c0a9f915789ab
SHA16c88956473307ca39066f53a549aac40074a8011
SHA2566cf6e6763fd77d662c2bab7f63be1eb8ffcce3122e7dadff4a3a01090f5c43f5
SHA512144c4aef1929e0c1c0e5cbd4149183d92619d647afcc732d135c9f138cb94fdb6c353ac23aedce0c5418fb159bd777554cbd58c11914883fc5ad8644f7aaeac6
-
Filesize
93KB
MD56ba63ce6cd77fd1c5d25d4b428242537
SHA13869f484159a10cb0453d7152c7ca18133bf9799
SHA25662c6a4b8e8eccc1e679150e65f5a7ed41866aac6c21d13f6ca054a65e0817482
SHA512077eba9650211083c148e5225b6ae9fe32abc7177d2ee6b54ea602ea167a65d6813fd5378a84498408792a19dd5022ce6f7ac94fcb570cac8ba26aaa7d20188f