Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:47
Behavioral task
behavioral1
Sample
38969f654f563235674655e0f8b41564.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38969f654f563235674655e0f8b41564.exe
Resource
win10v2004-20231215-en
General
-
Target
38969f654f563235674655e0f8b41564.exe
-
Size
5.8MB
-
MD5
38969f654f563235674655e0f8b41564
-
SHA1
38ba48abc89c446e181b26c133244dbd1afd2ea4
-
SHA256
cb7c3584ba94658628515b154ed577ae29afb4592ebef8e1723a169804bbc81b
-
SHA512
1fa7de850d8294ce8c7da71644394094e0480907669bd5552d90e15a70e8b97cc99a4cfc078d2aad3d9a24a5fa091b6fe20a1fde5dc06f3d1deaf8bc3f7cde67
-
SSDEEP
98304:g5Y6dSrbILhbpl4HBUCczzM3G7azKOmNb0uMyZmIZ4HBUCczzM3:3mSrM58WC1KOmFmbTWC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 38969f654f563235674655e0f8b41564.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 38969f654f563235674655e0f8b41564.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 38969f654f563235674655e0f8b41564.exe -
resource yara_rule behavioral1/memory/1932-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0008000000012248-15.dat upx behavioral1/memory/2376-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0008000000012248-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 38969f654f563235674655e0f8b41564.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 38969f654f563235674655e0f8b41564.exe 2376 38969f654f563235674655e0f8b41564.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2376 1932 38969f654f563235674655e0f8b41564.exe 28 PID 1932 wrote to memory of 2376 1932 38969f654f563235674655e0f8b41564.exe 28 PID 1932 wrote to memory of 2376 1932 38969f654f563235674655e0f8b41564.exe 28 PID 1932 wrote to memory of 2376 1932 38969f654f563235674655e0f8b41564.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38969f654f563235674655e0f8b41564.exe"C:\Users\Admin\AppData\Local\Temp\38969f654f563235674655e0f8b41564.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\38969f654f563235674655e0f8b41564.exeC:\Users\Admin\AppData\Local\Temp\38969f654f563235674655e0f8b41564.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b4c852c485cc0a7fc13862d415f7fbed
SHA1f212bd563f153bb1677675f501f39572ecfc0d22
SHA256b30850608141f2f979d8bb62e6f5cf832c181b5f9b87cbf6bdede5b1386feb3c
SHA512f6a47d7541601f9346c193a7f65ecbac0616c9009a1d9ad5fd3a2dd96b69218f1bea77a94bf38c0cc9b388bdbcb3a732c53980afaa00c72bb402ba1e6a5e5842
-
Filesize
1.1MB
MD5d4a569552e9d1e2b450b0d0314324a96
SHA1b8430817d6ddca1080fb7363c2cc4a108778232d
SHA256b6f4960d0ffd1d32d8cd23ab9a0162a1b959f690cc523a8307317438082cdbf7
SHA512c93a6ccdfb3f519fbeb519971aaca960f12b1f8568a9e0ad1ecf1886f7a0abd8941ec3230c1e0b79b783316273686dbb551d1940b724c185e953d15466b6bd7e