Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:31
Static task
static1
Behavioral task
behavioral1
Sample
2a15bc0684b7ef794781c65aa36bff96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a15bc0684b7ef794781c65aa36bff96.exe
Resource
win10v2004-20231222-en
General
-
Target
2a15bc0684b7ef794781c65aa36bff96.exe
-
Size
82KB
-
MD5
2a15bc0684b7ef794781c65aa36bff96
-
SHA1
16a1f51f989747c524f42b51c1b26a9b6c6befce
-
SHA256
e26cc6e1f39d0d8d0d730ec572e1efaa405ef354d7dc61bc333a27ee89de6873
-
SHA512
a0f41029f1b475cd5a49053e6a8d1198ae7e37e8b1e1503abe10b3be1f9a8c3288e9e086287d33fe6336782c776297dedc9023187d3cf55c393517eb418e7aa8
-
SSDEEP
1536:vWfLStpZtIe/b2SdiSEt2EiqFRnQ0Zh+2RC2raiVU+elN+5T:ef+pse/b2Sdip9bZhngamlN+p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2000 2a15bc0684b7ef794781c65aa36bff96.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 2a15bc0684b7ef794781c65aa36bff96.exe -
Loads dropped DLL 1 IoCs
pid Process 756 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 756 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 756 2a15bc0684b7ef794781c65aa36bff96.exe 2000 2a15bc0684b7ef794781c65aa36bff96.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2000 756 2a15bc0684b7ef794781c65aa36bff96.exe 29 PID 756 wrote to memory of 2000 756 2a15bc0684b7ef794781c65aa36bff96.exe 29 PID 756 wrote to memory of 2000 756 2a15bc0684b7ef794781c65aa36bff96.exe 29 PID 756 wrote to memory of 2000 756 2a15bc0684b7ef794781c65aa36bff96.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe"C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exeC:\Users\Admin\AppData\Local\Temp\2a15bc0684b7ef794781c65aa36bff96.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b500ee737361182134d12dde7627f209
SHA18b45ee3edab2526172188e8ae46779e2fef927b2
SHA256feb67e177fc926b020620fbd8897cf4bb8ed5e914760b2aceb6aeffb87b53e6c
SHA5120b43bded1d7169245f103adcd8ae6ce40bd28b334d1a050d5e469a0d2f5462d5cc7da2f5342c833892f8cc49ceebc9272146c894d9a07636266982f5c72921fd