Analysis
-
max time kernel
108s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:16
Behavioral task
behavioral1
Sample
29a18c71eb1e2f34713a825953e535ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29a18c71eb1e2f34713a825953e535ff.exe
Resource
win10v2004-20231215-en
General
-
Target
29a18c71eb1e2f34713a825953e535ff.exe
-
Size
2.9MB
-
MD5
29a18c71eb1e2f34713a825953e535ff
-
SHA1
98cffdbbd2c1505f501ee7d7c76113488b56fcd9
-
SHA256
51139451377e99ff3f2d874aa8a2e6c02f8fef9df6a62eccfee0728ece8fb30c
-
SHA512
00fdd2df9e33115ca3f570603b00246cea4f471a1c1e4e07e1600354d3c4a230f9b4a460e95d952cc9305de0da73f85b3e95db6a77faaa2fbf2d01e199b81be0
-
SSDEEP
49152:5VErvJ0ufFCOVDgnAx88MkaCP15N74NH5HUyNRcUsCVOzetdZJ:5i7J0udCOV0L83r4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3244 29a18c71eb1e2f34713a825953e535ff.exe -
Executes dropped EXE 1 IoCs
pid Process 3244 29a18c71eb1e2f34713a825953e535ff.exe -
resource yara_rule behavioral2/memory/3476-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000001e71b-11.dat upx behavioral2/memory/3244-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3476 29a18c71eb1e2f34713a825953e535ff.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3476 29a18c71eb1e2f34713a825953e535ff.exe 3244 29a18c71eb1e2f34713a825953e535ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 3244 3476 29a18c71eb1e2f34713a825953e535ff.exe 89 PID 3476 wrote to memory of 3244 3476 29a18c71eb1e2f34713a825953e535ff.exe 89 PID 3476 wrote to memory of 3244 3476 29a18c71eb1e2f34713a825953e535ff.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a18c71eb1e2f34713a825953e535ff.exe"C:\Users\Admin\AppData\Local\Temp\29a18c71eb1e2f34713a825953e535ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\29a18c71eb1e2f34713a825953e535ff.exeC:\Users\Admin\AppData\Local\Temp\29a18c71eb1e2f34713a825953e535ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD56e33618730ebbf1aa2ec57cd0de8df56
SHA1a50ce6b45c2e03cf6f8ed6aa6ef7ba10ad789989
SHA25678e63c2ba1e7f65ff5d63ea99b9677279eff19f27aec18a02528ff218f306d94
SHA5128d2c84ed46a2e8a57544d392423d834f44857c413dea7dfe2a24ea0a49923c05e6374b4cdc107c6b274c29dec1aa9db3b1dd44e7f6611618a9a7ec1a23afaedd