Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:52
Behavioral task
behavioral1
Sample
2abe6e90579f5e863c834be2188313b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2abe6e90579f5e863c834be2188313b2.exe
Resource
win10v2004-20231215-en
General
-
Target
2abe6e90579f5e863c834be2188313b2.exe
-
Size
2.9MB
-
MD5
2abe6e90579f5e863c834be2188313b2
-
SHA1
b62746b63a697674989614ab41604b13683904fe
-
SHA256
4d7aacc6abe878039e0f726ec719e4f41ea94ddd7fe2cbcebce67f7d1de307ba
-
SHA512
4b759cce24be3bb0290c7a45e348e8b624c1feec2c1526432457b4396b65a6b3228a36382a395a83a0e2fac18e62df140f98adc0ad75403f72d633a3be46414a
-
SSDEEP
49152:Zgcsw0fk/4cT8JX6liYcU8QUQjewrC9RvzAK39/eXbIVbeDI1WuzksBTvT:acsw0c/48cX68dUAQjpC/vzAK3lGIycH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1068 2abe6e90579f5e863c834be2188313b2.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 2abe6e90579f5e863c834be2188313b2.exe -
resource yara_rule behavioral2/memory/1424-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000231ea-11.dat upx behavioral2/memory/1068-12-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1424 2abe6e90579f5e863c834be2188313b2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1424 2abe6e90579f5e863c834be2188313b2.exe 1068 2abe6e90579f5e863c834be2188313b2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1068 1424 2abe6e90579f5e863c834be2188313b2.exe 88 PID 1424 wrote to memory of 1068 1424 2abe6e90579f5e863c834be2188313b2.exe 88 PID 1424 wrote to memory of 1068 1424 2abe6e90579f5e863c834be2188313b2.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2abe6e90579f5e863c834be2188313b2.exe"C:\Users\Admin\AppData\Local\Temp\2abe6e90579f5e863c834be2188313b2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\2abe6e90579f5e863c834be2188313b2.exeC:\Users\Admin\AppData\Local\Temp\2abe6e90579f5e863c834be2188313b2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD50ea8b09d55cf4bad4f6c25cc1a61f3b4
SHA1222de5d633693010a080f34eea5d6a086e31f719
SHA2565ed87b7abf291cb9e86defc458aca19bda6df1c4371e4df9b1a65baa7427bfb4
SHA51239df03723c3dbd07f9c97c98433823059f22dbb8134e1ad9b3c1080cf6c5b37d200a0b71f31d0102a956b47737a98f7bf44fa1c0c121e71eaab7c8a604dd837c