Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
295639368f14a46c46d0d08b67432251.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
295639368f14a46c46d0d08b67432251.exe
Resource
win10v2004-20231215-en
General
-
Target
295639368f14a46c46d0d08b67432251.exe
-
Size
57KB
-
MD5
295639368f14a46c46d0d08b67432251
-
SHA1
f216114038cb77467f9208f9e7ddcef62de1d18a
-
SHA256
e57502f73a854395ea371e04650f7bfbf6775e2642702e86803e9dcdb72b9b42
-
SHA512
3cd41e11c84bef6451e210be00a0cb0701ef300c192c2f79813eb8272d18866a44ad8eb4fc6c26f4e19d3cb13c3c43608dd5cde6dac5a3a0e52088e9c62a489f
-
SSDEEP
1536:AOJay3fqwEPrvtIm22Q2cAGhLAzciZxH9YoSC/VhDeCW:AOAAiwuY/AeLMvZxHeC/HDe7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 295639368f14a46c46d0d08b67432251.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 295639368f14a46c46d0d08b67432251.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 295639368f14a46c46d0d08b67432251.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 295639368f14a46c46d0d08b67432251.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 295639368f14a46c46d0d08b67432251.exe 2684 295639368f14a46c46d0d08b67432251.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2684 2168 295639368f14a46c46d0d08b67432251.exe 30 PID 2168 wrote to memory of 2684 2168 295639368f14a46c46d0d08b67432251.exe 30 PID 2168 wrote to memory of 2684 2168 295639368f14a46c46d0d08b67432251.exe 30 PID 2168 wrote to memory of 2684 2168 295639368f14a46c46d0d08b67432251.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\295639368f14a46c46d0d08b67432251.exe"C:\Users\Admin\AppData\Local\Temp\295639368f14a46c46d0d08b67432251.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\295639368f14a46c46d0d08b67432251.exeC:\Users\Admin\AppData\Local\Temp\295639368f14a46c46d0d08b67432251.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD54babad92f34a023b76e9b999a27fac18
SHA16f8bf8e6a99168fc8f8e44d3d9a865c679366cf4
SHA2564dc5249b2b90059ea3ed5578121db1c7e60b2dc7190c11460c9f8c169801fbf1
SHA5129aaa4cea2ca3ca70092d637d41857f8bc51849583f89b2e7ea108dc66d4c0469c4a6ebe066197ef5f8df9d213b7faef3cb7c2c2c3f37a5530ca5192cc9e84f6e