Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
2bd10174dd79fcca80fcd765c2bc0a66.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2bd10174dd79fcca80fcd765c2bc0a66.exe
Resource
win10v2004-20231215-en
General
-
Target
2bd10174dd79fcca80fcd765c2bc0a66.exe
-
Size
3.3MB
-
MD5
2bd10174dd79fcca80fcd765c2bc0a66
-
SHA1
18cf3da16fba8b400c4bffb9584af6b163c06ecf
-
SHA256
86a5d8a8c2c53caccf4935c8224627ff47e26262223fe3e353802134c5a7c826
-
SHA512
11e3c9a0038e6fee9436cb7f3ac34d2f8067c1cfaf06b40ccefb9c7ac3c24bda210bd2fdd56acdc45a769140ea04027b238aa55c567d7eddba8340ef356602cd
-
SSDEEP
98304:QkMF6n7tWlMjWJF2shnqKpNv6c3sXAlk2O:PMF6nAMjkRzv6cQXr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2104 2bd10174dd79fcca80fcd765c2bc0a66.exe -
Executes dropped EXE 1 IoCs
pid Process 2104 2bd10174dd79fcca80fcd765c2bc0a66.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 2bd10174dd79fcca80fcd765c2bc0a66.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4408 2bd10174dd79fcca80fcd765c2bc0a66.exe 2104 2bd10174dd79fcca80fcd765c2bc0a66.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2104 4408 2bd10174dd79fcca80fcd765c2bc0a66.exe 89 PID 4408 wrote to memory of 2104 4408 2bd10174dd79fcca80fcd765c2bc0a66.exe 89 PID 4408 wrote to memory of 2104 4408 2bd10174dd79fcca80fcd765c2bc0a66.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bd10174dd79fcca80fcd765c2bc0a66.exe"C:\Users\Admin\AppData\Local\Temp\2bd10174dd79fcca80fcd765c2bc0a66.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\2bd10174dd79fcca80fcd765c2bc0a66.exeC:\Users\Admin\AppData\Local\Temp\2bd10174dd79fcca80fcd765c2bc0a66.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2104
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD551113737c1d390304778abe12a38363f
SHA1be83252b7e33d253df6f68facd560b477e20f13f
SHA25629944662b2ee2a38092c1c87206a0442500429702aa2522c0bfe56a52f7ffae5
SHA5124693b9a9539445ad4409e4c186c96ce406883a8e1cc4110734b0cb3c632edfd43e4de10e1d32f653b153e583b790ec4e73a7617f90951085b5e4916372818183