Analysis
-
max time kernel
206s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2ab4f29250802fbe652579addb463f64.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ab4f29250802fbe652579addb463f64.exe
Resource
win10v2004-20231215-en
General
-
Target
2ab4f29250802fbe652579addb463f64.exe
-
Size
84KB
-
MD5
2ab4f29250802fbe652579addb463f64
-
SHA1
efafadda39739bd466321d3254c78734a8252fa2
-
SHA256
e5dc6f50a87e4a2e83bd8d63d1c43de3683a829642788bb2a63bb04286d7d915
-
SHA512
386eff84a2c8255a2455e9d3c4189fcb3063ebe9225f9db25c03af337c23c430f8b319f8c67b550c89661999e8c3bd5cbc204dd2a8b4f26c78fcaa4f865c02c3
-
SSDEEP
1536:haJmWoD6IX4aPJkobpkLHj2Od4zlIWdVxj43yoQWzK4PhNdTfrraC8T6uE4672rw:h3l6IX4/k+HqOizC2BftJAHdTalG46q8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4020 2ab4f29250802fbe652579addb463f64.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3188 2ab4f29250802fbe652579addb463f64.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3188 2ab4f29250802fbe652579addb463f64.exe 4020 2ab4f29250802fbe652579addb463f64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4020 3188 2ab4f29250802fbe652579addb463f64.exe 96 PID 3188 wrote to memory of 4020 3188 2ab4f29250802fbe652579addb463f64.exe 96 PID 3188 wrote to memory of 4020 3188 2ab4f29250802fbe652579addb463f64.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe"C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exeC:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5e61ff5c7d1fff69e89693d6185afb0de
SHA182f0e009b69cd5aadc6c50614ab885daaede9f0a
SHA2565b2aec6cf1ed43f6fb46f4d2889eb8f463eddd5d9b8a79bcf4414f276efd2230
SHA512829eb11923f3444a1e3f6169c1e0bb5c74aef47a2ea47a3cb9964c4feb1010245c984498ae9b69642b4c4dcf407dbc5be6436c873105e1081e13572883f0326d