Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
275f3aab695a3c9f3a52087364f13ace.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
275f3aab695a3c9f3a52087364f13ace.exe
Resource
win10v2004-20231215-en
General
-
Target
275f3aab695a3c9f3a52087364f13ace.exe
-
Size
82KB
-
MD5
275f3aab695a3c9f3a52087364f13ace
-
SHA1
76c4926cc4dfd07bab85239241a14489551ce48a
-
SHA256
7b529184a29490b5e9da13bf525f8fb097520aac43549e0dfbe9d746ea304f33
-
SHA512
60eabab024ffea73108aac90a2ca95d431dc13ee412529de04dfc8e09e880dbaa5972f76aab56476f91cba36a0f2c96f90c80ebefc98804d7e4cb5db4c52156c
-
SSDEEP
1536:PoXo/4XYVj02TvJCYGlJvQDJ8s1h04TNFw6hFUCN5h5czBmiiG7Fty601:Pn/HVj02TvJ7GlJYDmsYgFw6z3czBm/b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2508 275f3aab695a3c9f3a52087364f13ace.exe -
Executes dropped EXE 1 IoCs
pid Process 2508 275f3aab695a3c9f3a52087364f13ace.exe -
Loads dropped DLL 1 IoCs
pid Process 1352 275f3aab695a3c9f3a52087364f13ace.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 275f3aab695a3c9f3a52087364f13ace.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1352 275f3aab695a3c9f3a52087364f13ace.exe 2508 275f3aab695a3c9f3a52087364f13ace.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2508 1352 275f3aab695a3c9f3a52087364f13ace.exe 29 PID 1352 wrote to memory of 2508 1352 275f3aab695a3c9f3a52087364f13ace.exe 29 PID 1352 wrote to memory of 2508 1352 275f3aab695a3c9f3a52087364f13ace.exe 29 PID 1352 wrote to memory of 2508 1352 275f3aab695a3c9f3a52087364f13ace.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\275f3aab695a3c9f3a52087364f13ace.exe"C:\Users\Admin\AppData\Local\Temp\275f3aab695a3c9f3a52087364f13ace.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\275f3aab695a3c9f3a52087364f13ace.exeC:\Users\Admin\AppData\Local\Temp\275f3aab695a3c9f3a52087364f13ace.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD565f82540451f1bac17aa611c178a5d5d
SHA1c219b298c8bf428c0c2415cc91e10784bee381ed
SHA256745e86c444c0189ae6ccd41e0acbb231405560377fa4ef39c75dea65919f582d
SHA5121d855c48104d1fe167b06743c28929ae52b1552da117a5e1efae3081148723f9fc63eac6a6d540cd1d0f3e98d67bf7dbdc335b0f7a46daa8358c6b3f0eb70ec7