Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:58
Behavioral task
behavioral1
Sample
37049e356f0337c4739c369703d6f73d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37049e356f0337c4739c369703d6f73d.exe
Resource
win10v2004-20231222-en
General
-
Target
37049e356f0337c4739c369703d6f73d.exe
-
Size
2.9MB
-
MD5
37049e356f0337c4739c369703d6f73d
-
SHA1
892e48eaf5c90eb96374455702d8a954caae77bd
-
SHA256
beb59d6d39a86aefc4b74f4dfafaf269ba73061d45c45f2196b7fdda33e5bd30
-
SHA512
be62a3369ba06dbc9c6b643f2b589ad72777eaf5ac9de1af6efa8f5bb706e061f1ec76e4135d5d224c4fa1228e50562f834cf3a16602ac6a24769b40a5f3d5a7
-
SSDEEP
49152:zE4TIktp+auoEqNtujtUBvKbdP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:zZpVV/NtuJWvKbdgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4024 37049e356f0337c4739c369703d6f73d.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 37049e356f0337c4739c369703d6f73d.exe -
resource yara_rule behavioral2/memory/4024-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000001e5df-11.dat upx behavioral2/memory/5008-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5008 37049e356f0337c4739c369703d6f73d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5008 37049e356f0337c4739c369703d6f73d.exe 4024 37049e356f0337c4739c369703d6f73d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4024 5008 37049e356f0337c4739c369703d6f73d.exe 17 PID 5008 wrote to memory of 4024 5008 37049e356f0337c4739c369703d6f73d.exe 17 PID 5008 wrote to memory of 4024 5008 37049e356f0337c4739c369703d6f73d.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\37049e356f0337c4739c369703d6f73d.exe"C:\Users\Admin\AppData\Local\Temp\37049e356f0337c4739c369703d6f73d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\37049e356f0337c4739c369703d6f73d.exeC:\Users\Admin\AppData\Local\Temp\37049e356f0337c4739c369703d6f73d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5f75eedb46200b3e9b5003df193aeaab4
SHA12ba056292132688b52fe1c261992be31633ead4c
SHA25643ec8f47c3db6ab156d3803a57b9ce9a688549d07e107e34aa34af2db0fab541
SHA512105a22fcee474c862620c9252e1b0c7dfc3d8772eca0b0631a0530543c62c840c08aa761e50c6da0d097e1ba2abb6ea6c4c108e4fd67b4e0aa00c81d9139e166