Analysis

  • max time kernel
    206s
  • max time network
    230s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 05:51

General

  • Target

    2ab4f29250802fbe652579addb463f64.exe

  • Size

    84KB

  • MD5

    2ab4f29250802fbe652579addb463f64

  • SHA1

    efafadda39739bd466321d3254c78734a8252fa2

  • SHA256

    e5dc6f50a87e4a2e83bd8d63d1c43de3683a829642788bb2a63bb04286d7d915

  • SHA512

    386eff84a2c8255a2455e9d3c4189fcb3063ebe9225f9db25c03af337c23c430f8b319f8c67b550c89661999e8c3bd5cbc204dd2a8b4f26c78fcaa4f865c02c3

  • SSDEEP

    1536:haJmWoD6IX4aPJkobpkLHj2Od4zlIWdVxj43yoQWzK4PhNdTfrraC8T6uE4672rw:h3l6IX4/k+HqOizC2BftJAHdTalG46q8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe
    "C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe
      C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2ab4f29250802fbe652579addb463f64.exe

    Filesize

    84KB

    MD5

    e61ff5c7d1fff69e89693d6185afb0de

    SHA1

    82f0e009b69cd5aadc6c50614ab885daaede9f0a

    SHA256

    5b2aec6cf1ed43f6fb46f4d2889eb8f463eddd5d9b8a79bcf4414f276efd2230

    SHA512

    829eb11923f3444a1e3f6169c1e0bb5c74aef47a2ea47a3cb9964c4feb1010245c984498ae9b69642b4c4dcf407dbc5be6436c873105e1081e13572883f0326d

  • memory/3188-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3188-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/3188-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3188-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4020-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4020-15-0x00000000000E0000-0x000000000010F000-memory.dmp

    Filesize

    188KB

  • memory/4020-21-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB

  • memory/4020-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB