Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 22:48
Behavioral task
behavioral1
Sample
421d2f54a2e9ba8c2c78eaaefed6d1c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
421d2f54a2e9ba8c2c78eaaefed6d1c9.exe
Resource
win10v2004-20231215-en
General
-
Target
421d2f54a2e9ba8c2c78eaaefed6d1c9.exe
-
Size
5.8MB
-
MD5
421d2f54a2e9ba8c2c78eaaefed6d1c9
-
SHA1
9a58bc71edf496497789d0a16a0a029cfe7d7741
-
SHA256
c0428607ed9de91b77fe6d9d259d9e0599ee921a7d56c23d83eaf149e18bb9f4
-
SHA512
1b442f43efc94773591896fa0fd709bd5a0e9165b15f7d388d916c2a69a7c516f3c7ede4b119c57e3195d1719b81ef52bf8f76ee6e727af6d9c175ac059cc23e
-
SSDEEP
98304:UIySiUWE59roEWrHjKX+Ql1F0qeE70GdC94crrVXq5SDVTjKX+Ql1F0qeE70:aMfrrovrDK7dDdC9rr9qYBnK7d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1700 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe -
Executes dropped EXE 1 IoCs
pid Process 1700 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe -
resource yara_rule behavioral2/memory/3472-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002320b-11.dat upx behavioral2/memory/1700-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3472 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3472 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe 1700 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 1700 3472 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe 88 PID 3472 wrote to memory of 1700 3472 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe 88 PID 3472 wrote to memory of 1700 3472 421d2f54a2e9ba8c2c78eaaefed6d1c9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\421d2f54a2e9ba8c2c78eaaefed6d1c9.exe"C:\Users\Admin\AppData\Local\Temp\421d2f54a2e9ba8c2c78eaaefed6d1c9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\421d2f54a2e9ba8c2c78eaaefed6d1c9.exeC:\Users\Admin\AppData\Local\Temp\421d2f54a2e9ba8c2c78eaaefed6d1c9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5f6cdced0a8744cf5077320eba7dae34c
SHA1dffe015b3733e6d1de801cfda50b9bc6e40d81d9
SHA25652dbe5aa00787c0afe2c9df2955741421392fd12cfb86ce83910d1da26be27a9
SHA51292f5953190c52b53dd4b2cc409e4dcc5c595b498fa678cfb7f82633ee4a4f1dc5ce628c1885aac0bdb9c74c823aed6efbf7f156be8dcb2281c624a79c55dc270