Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:24
Behavioral task
behavioral1
Sample
2d47e50fa539a5beb41de427670a2832.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d47e50fa539a5beb41de427670a2832.exe
Resource
win10v2004-20231215-en
General
-
Target
2d47e50fa539a5beb41de427670a2832.exe
-
Size
2.7MB
-
MD5
2d47e50fa539a5beb41de427670a2832
-
SHA1
31541f8ffc5ec7d0a7594071c143aebafedc5f43
-
SHA256
2410e835d44ad7b678a66734728a7266cfe36ec4249e3250243c28bcae6e85a8
-
SHA512
60be5dc14ab465f93f997c430e8d85225f7eaec4f5d6d74abae8296f412154700f35668a1130260902a7318c6468070acf10996ccf281cd133f084d89196911e
-
SSDEEP
49152:uEJaPE6mBXpsEwyxES28R9cF5OonzWMnpMax+SW0IcWpAfejR9j:xaDm5pp1128HcFoLWT+SW0xWvHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1908 2d47e50fa539a5beb41de427670a2832.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 2d47e50fa539a5beb41de427670a2832.exe -
resource yara_rule behavioral2/memory/3136-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0009000000023109-11.dat upx behavioral2/memory/1908-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3136 2d47e50fa539a5beb41de427670a2832.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3136 2d47e50fa539a5beb41de427670a2832.exe 1908 2d47e50fa539a5beb41de427670a2832.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3136 wrote to memory of 1908 3136 2d47e50fa539a5beb41de427670a2832.exe 93 PID 3136 wrote to memory of 1908 3136 2d47e50fa539a5beb41de427670a2832.exe 93 PID 3136 wrote to memory of 1908 3136 2d47e50fa539a5beb41de427670a2832.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe"C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exeC:\Users\Admin\AppData\Local\Temp\2d47e50fa539a5beb41de427670a2832.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687KB
MD57738efb3ccd411ca64800784f12077ab
SHA120f54d209e718a2640c78cb77e3b24149e908a6c
SHA256e07475681aff404f826a4e20f28810eb0c06b4f9b9632ca7a27eb1589c2ad654
SHA512318de075ea13bb254a239203cdbcb1db4fca597ff724e256d752ec3eda384956821a506e59695c1a96fe9de065452722f6dea1d4bb3aede57c907050f24a70b1