Analysis
-
max time kernel
156s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:58
Behavioral task
behavioral1
Sample
291b7dc967014577275aa61771876ac4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
291b7dc967014577275aa61771876ac4.exe
Resource
win10v2004-20231215-en
General
-
Target
291b7dc967014577275aa61771876ac4.exe
-
Size
2.7MB
-
MD5
291b7dc967014577275aa61771876ac4
-
SHA1
686fb8d99b9d73c1b073a96f0760a680d62dd161
-
SHA256
98e62a32a3267ceee2804c8789dec1eb0944583ef84b3324f360499b9883a973
-
SHA512
5440b7e3a0e2a7a91786ac72a1c72a4f3ae583b473c74ef07cbb910c27024e86b09f3443ea6e6178e18b59738bcb53b07759cd012191ac9ff1997ea7258b3927
-
SSDEEP
49152:SaEH33e2AUADqCUC5+wFVEmacu4wh1HqgHCLI1yb6UW+X2EBQiNTTDp:o33t6gs+HfcuZhHixb6YxQitDp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3600 291b7dc967014577275aa61771876ac4.exe -
Executes dropped EXE 1 IoCs
pid Process 3600 291b7dc967014577275aa61771876ac4.exe -
resource yara_rule behavioral2/memory/1248-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000500000001e715-11.dat upx behavioral2/memory/3600-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1248 291b7dc967014577275aa61771876ac4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1248 291b7dc967014577275aa61771876ac4.exe 3600 291b7dc967014577275aa61771876ac4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3600 1248 291b7dc967014577275aa61771876ac4.exe 94 PID 1248 wrote to memory of 3600 1248 291b7dc967014577275aa61771876ac4.exe 94 PID 1248 wrote to memory of 3600 1248 291b7dc967014577275aa61771876ac4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\291b7dc967014577275aa61771876ac4.exe"C:\Users\Admin\AppData\Local\Temp\291b7dc967014577275aa61771876ac4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\291b7dc967014577275aa61771876ac4.exeC:\Users\Admin\AppData\Local\Temp\291b7dc967014577275aa61771876ac4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3600
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59e4db636bd49f24bfe5aae9656508211
SHA1b44b49fab80b63e9527686adb61233962cd90c28
SHA256a2703911bfb1ba62ab7a6fe145c7b3c1f025d77bafc1e760eac2d4903638c1aa
SHA51242f48cac5341aca5fa3649688aa4aaeed8324266a8645db9ee8865c2110ffb303597d9223ffa7297f0807339e2202c7d267d5c38587426ee20dbae1fcf0765b1