Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
396aee14e3f13c9be4c27dac32057970.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
396aee14e3f13c9be4c27dac32057970.exe
Resource
win10v2004-20231215-en
General
-
Target
396aee14e3f13c9be4c27dac32057970.exe
-
Size
162KB
-
MD5
396aee14e3f13c9be4c27dac32057970
-
SHA1
64ff4c92aacd9a510202e32da2de05038c6b2120
-
SHA256
930f3f1229231e45a73191d82ce6f568b6022f4fe92b5faf9a300e23d6feb6e8
-
SHA512
e012869e1fdb203c789569515f7359ea1cd6c12702ebe5ac10588c6d6ab865cab296687717c19afc4a89643a1db629ed3ca10365a4bc5436176a50e26d3721e0
-
SSDEEP
3072:zepaVVtpnNYw9NM22vWXmutt1TkuAERAF3PVU6by/fH/vZycn/:qpaV5ew0K2ut7TkF1+tH/vZF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1852 396aee14e3f13c9be4c27dac32057970.exe -
Executes dropped EXE 1 IoCs
pid Process 1852 396aee14e3f13c9be4c27dac32057970.exe -
Loads dropped DLL 1 IoCs
pid Process 1744 396aee14e3f13c9be4c27dac32057970.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1744 396aee14e3f13c9be4c27dac32057970.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1744 396aee14e3f13c9be4c27dac32057970.exe 1852 396aee14e3f13c9be4c27dac32057970.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1852 1744 396aee14e3f13c9be4c27dac32057970.exe 29 PID 1744 wrote to memory of 1852 1744 396aee14e3f13c9be4c27dac32057970.exe 29 PID 1744 wrote to memory of 1852 1744 396aee14e3f13c9be4c27dac32057970.exe 29 PID 1744 wrote to memory of 1852 1744 396aee14e3f13c9be4c27dac32057970.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\396aee14e3f13c9be4c27dac32057970.exe"C:\Users\Admin\AppData\Local\Temp\396aee14e3f13c9be4c27dac32057970.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\396aee14e3f13c9be4c27dac32057970.exeC:\Users\Admin\AppData\Local\Temp\396aee14e3f13c9be4c27dac32057970.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5a1b234c04eca3b2a72ce0be7bf26501d
SHA1b878c5b48e8743bfa72c8a2c1e634b1b3e9b8307
SHA25696ee2e037a7a61c443152e6eb06d32a6af7d368ebae52fac2f83d2a69355a505
SHA512f5f1ca98e8e1095373a46c761b0d18a218bd1c925a30e091dd0242db00fb92dbaeccfddf44703e000765b7044980d70795fb64842f64376df5e8356b6939ef69