Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:34
Behavioral task
behavioral1
Sample
2a30ca4573dd86b58163c684d28ea603.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a30ca4573dd86b58163c684d28ea603.exe
Resource
win10v2004-20231215-en
General
-
Target
2a30ca4573dd86b58163c684d28ea603.exe
-
Size
1.3MB
-
MD5
2a30ca4573dd86b58163c684d28ea603
-
SHA1
8a82e1bb1a5efec08015ecbe47b417c7ff1de07c
-
SHA256
6d15dd98bd82cb73b5653d38ab12054485fd6b5d8072c1062f3a253570749d5d
-
SHA512
255bbd3258d027b0b18855fafa28334e5a43fb5108ab731528e358627a4fb8d72dba08e33414918fe3224b1279ef6af98a3e48735963412f284eebe0f7172c10
-
SSDEEP
24576:myRG8EsC0xz9Ge7LYTpUjIj6A1GqNAbcIq8u2bgEI2vG:HobfCzsC2GatSg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 2a30ca4573dd86b58163c684d28ea603.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 2a30ca4573dd86b58163c684d28ea603.exe -
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001f45f-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2132 2a30ca4573dd86b58163c684d28ea603.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2132 2a30ca4573dd86b58163c684d28ea603.exe 2396 2a30ca4573dd86b58163c684d28ea603.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2396 2132 2a30ca4573dd86b58163c684d28ea603.exe 91 PID 2132 wrote to memory of 2396 2132 2a30ca4573dd86b58163c684d28ea603.exe 91 PID 2132 wrote to memory of 2396 2132 2a30ca4573dd86b58163c684d28ea603.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a30ca4573dd86b58163c684d28ea603.exe"C:\Users\Admin\AppData\Local\Temp\2a30ca4573dd86b58163c684d28ea603.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\2a30ca4573dd86b58163c684d28ea603.exeC:\Users\Admin\AppData\Local\Temp\2a30ca4573dd86b58163c684d28ea603.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD52db1ec362bda0ae049dbb26215a96899
SHA1c15825295ebf7e3a4cf44507502dc2574b565b9e
SHA256e3ab42d3993cc5b8d1b973b388b7e037993ba12ebaf30e4faeec0f6cda5b7a0f
SHA512562bc5ccdae77dd4d68438a29e01d706054b54a3b2172e3b5e64c698f18021b242944bc442bb5195cde4ac9af3aa4684ebcadac346f6cc8edfdf75e57f8d583f