Analysis
-
max time kernel
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:28
Behavioral task
behavioral1
Sample
39d6eb7355a0950ac649948bed261c4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39d6eb7355a0950ac649948bed261c4c.exe
Resource
win10v2004-20231222-en
General
-
Target
39d6eb7355a0950ac649948bed261c4c.exe
-
Size
5.8MB
-
MD5
39d6eb7355a0950ac649948bed261c4c
-
SHA1
fd56bf729c00f7e47370401368cfbe31a0d2cfb0
-
SHA256
123db9df8abd13db179a2f29d407853b98da718437e62ca7080de82fc3b89e4c
-
SHA512
6fad9066ebf95032b3d5f2dff089d38f341f4e1230b17a9401923a1bd64b001c2798183100bbbc20366c01384610cd970a8636bd50f9d2bc71b584003ca0ae39
-
SSDEEP
98304:VIPdNjUy4lkYC7gg3gnl/IVUs1jePsB4eMhtsybtgkgg3gnl/IVUs1jePs:VIP7jUy44hgl/iBiPiktsGtgwgl/iBiP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5000 39d6eb7355a0950ac649948bed261c4c.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 39d6eb7355a0950ac649948bed261c4c.exe -
resource yara_rule behavioral2/memory/5044-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e630-11.dat upx behavioral2/memory/5000-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 39d6eb7355a0950ac649948bed261c4c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5044 39d6eb7355a0950ac649948bed261c4c.exe 5000 39d6eb7355a0950ac649948bed261c4c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 5000 5044 39d6eb7355a0950ac649948bed261c4c.exe 90 PID 5044 wrote to memory of 5000 5044 39d6eb7355a0950ac649948bed261c4c.exe 90 PID 5044 wrote to memory of 5000 5044 39d6eb7355a0950ac649948bed261c4c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d6eb7355a0950ac649948bed261c4c.exe"C:\Users\Admin\AppData\Local\Temp\39d6eb7355a0950ac649948bed261c4c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\39d6eb7355a0950ac649948bed261c4c.exeC:\Users\Admin\AppData\Local\Temp\39d6eb7355a0950ac649948bed261c4c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD51fd505bff004d464fa85e25dd1fabcd9
SHA1ffffe3958fa00c33ac9b1af433f161e4fe2c92a3
SHA25606c8fc1d67b8283f694cac671b6b4addcbeb1b3c751adda5de8ee3e4b6a64e2c
SHA5123f602d9c98089d73944fa60a982b401dc73ca4068d61c2983a719e429c6ebb7219341c03189f449c0e1f8c2f5204e0cb649da6761c827bbb1baaa4c194d93a02