Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
270a3b9a5fb578c06c5186bf3d4452f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
270a3b9a5fb578c06c5186bf3d4452f5.exe
Resource
win10v2004-20231215-en
General
-
Target
270a3b9a5fb578c06c5186bf3d4452f5.exe
-
Size
82KB
-
MD5
270a3b9a5fb578c06c5186bf3d4452f5
-
SHA1
7a0677934f43126bec400eb8b17bea0c337a91e0
-
SHA256
885563318fce969915f13dc41a165e5a51e95b91afc6b576f8c918e20f0dd6dc
-
SHA512
12dbbcaf5f6fb757374e9365c915897dc15a6653d19e6d456e09186081165438b276a25a63ec01212d826b77ab738da17e987b0361446fb89d224a8ae3719374
-
SSDEEP
1536:MUbGiLC4WoW7nZNDUsqlMlRTyg3nIpdaofyV5jvDo52ngP4VHBkHVw9v0:MUb9Goq7GXfIj0wqykHVwd0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3220 270a3b9a5fb578c06c5186bf3d4452f5.exe -
Executes dropped EXE 1 IoCs
pid Process 3220 270a3b9a5fb578c06c5186bf3d4452f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 270a3b9a5fb578c06c5186bf3d4452f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5040 270a3b9a5fb578c06c5186bf3d4452f5.exe 3220 270a3b9a5fb578c06c5186bf3d4452f5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3220 5040 270a3b9a5fb578c06c5186bf3d4452f5.exe 90 PID 5040 wrote to memory of 3220 5040 270a3b9a5fb578c06c5186bf3d4452f5.exe 90 PID 5040 wrote to memory of 3220 5040 270a3b9a5fb578c06c5186bf3d4452f5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\270a3b9a5fb578c06c5186bf3d4452f5.exe"C:\Users\Admin\AppData\Local\Temp\270a3b9a5fb578c06c5186bf3d4452f5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\270a3b9a5fb578c06c5186bf3d4452f5.exeC:\Users\Admin\AppData\Local\Temp\270a3b9a5fb578c06c5186bf3d4452f5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b7ba29f58558c4b86bfedb3d8e1160b1
SHA1168283a9c00994c1ca773e48806ee88538513dff
SHA256eb8b5c45c9582385c4b85ebf356176a0ac37dd87be401850c4df7289ef4bbab7
SHA512050ed789ce64748da0ce736223dbf89c607fb46995ea1e4932f978ef495de1f35625b9e410ff8ae6ede3617578974e64cd62dba3316a23959abf10a08f1afe64