Analysis
-
max time kernel
152s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:56
Behavioral task
behavioral1
Sample
36f0e5cc57ffaefebc8b692183da671d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f0e5cc57ffaefebc8b692183da671d.exe
Resource
win10v2004-20231215-en
General
-
Target
36f0e5cc57ffaefebc8b692183da671d.exe
-
Size
2.9MB
-
MD5
36f0e5cc57ffaefebc8b692183da671d
-
SHA1
468eb19965bc06196e67f96ef5df0a61f3dcae88
-
SHA256
caa2d25738ee23aac336920472d24fcd8f92ddc5a642de4b98be0856fda131de
-
SHA512
6c6779774dcb4666260501d478684d53d51d9f3dda7718ed4e40138ea8b575a85c8c47c07bdfebfc6197f58d33c12d4d9d1d180121ffbf3ef7b031a833762e05
-
SSDEEP
49152:z8quPyPqAAqc/RP8TiANSzn8PP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:wPfA7c/pcirz8Pgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2940 36f0e5cc57ffaefebc8b692183da671d.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 36f0e5cc57ffaefebc8b692183da671d.exe -
resource yara_rule behavioral2/memory/4924-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023200-11.dat upx behavioral2/memory/2940-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4924 36f0e5cc57ffaefebc8b692183da671d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4924 36f0e5cc57ffaefebc8b692183da671d.exe 2940 36f0e5cc57ffaefebc8b692183da671d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2940 4924 36f0e5cc57ffaefebc8b692183da671d.exe 90 PID 4924 wrote to memory of 2940 4924 36f0e5cc57ffaefebc8b692183da671d.exe 90 PID 4924 wrote to memory of 2940 4924 36f0e5cc57ffaefebc8b692183da671d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f0e5cc57ffaefebc8b692183da671d.exe"C:\Users\Admin\AppData\Local\Temp\36f0e5cc57ffaefebc8b692183da671d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\36f0e5cc57ffaefebc8b692183da671d.exeC:\Users\Admin\AppData\Local\Temp\36f0e5cc57ffaefebc8b692183da671d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5e8f585d97ac676a6f7e3bf628e4b0f30
SHA1aea53b25316ba9c5e9b9ca244718556dbd85e7e2
SHA256a8ebb9b09d29faaf00d06c98554993d0c70ee316e2c9eca0568ca14e48dc2664
SHA512f4cc3508018392e24bd70b70645101e68df650b32d30c0367c51dfd38e81380ee1ffac4fa654719f26b49a44b7940b806b74fad82fcf447f601f8913c319c453