Analysis
-
max time kernel
128s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 09:03
Behavioral task
behavioral1
Sample
40707b2f2d972c250d8aefc2f116a521.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40707b2f2d972c250d8aefc2f116a521.exe
Resource
win10v2004-20231215-en
General
-
Target
40707b2f2d972c250d8aefc2f116a521.exe
-
Size
2.9MB
-
MD5
40707b2f2d972c250d8aefc2f116a521
-
SHA1
f24501550afb45febb55ec9f3abe87356be74f00
-
SHA256
207924516bb2662ff59ebaf8e75ae6e4e56434cd651e770bf1b1888638c6d2cf
-
SHA512
4ce4d3d3a6c76bdd3df1bd40ac8b9a6ef6128525e5492b1f9422d541a42015f9129d249d709447da82c87b775be6031bba4356917b6481a0f69c00ea9e3daca1
-
SSDEEP
49152:N66zIYAZGCRK0QQf1AvKY9P4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:coHOOSY9gg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1592 40707b2f2d972c250d8aefc2f116a521.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 40707b2f2d972c250d8aefc2f116a521.exe -
resource yara_rule behavioral2/memory/1508-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002321d-11.dat upx behavioral2/memory/1592-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1508 40707b2f2d972c250d8aefc2f116a521.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1508 40707b2f2d972c250d8aefc2f116a521.exe 1592 40707b2f2d972c250d8aefc2f116a521.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1592 1508 40707b2f2d972c250d8aefc2f116a521.exe 91 PID 1508 wrote to memory of 1592 1508 40707b2f2d972c250d8aefc2f116a521.exe 91 PID 1508 wrote to memory of 1592 1508 40707b2f2d972c250d8aefc2f116a521.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\40707b2f2d972c250d8aefc2f116a521.exe"C:\Users\Admin\AppData\Local\Temp\40707b2f2d972c250d8aefc2f116a521.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\40707b2f2d972c250d8aefc2f116a521.exeC:\Users\Admin\AppData\Local\Temp\40707b2f2d972c250d8aefc2f116a521.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
565KB
MD5a46b648d169a727ae1bdae56ee6ebc9a
SHA1e1a327f920805928ccb1aa7820709e84e2c1bb63
SHA256f70893cfb2f23ba61adc905b452a385bf678482f9f9049570e12a4f64a12e1e0
SHA5125970eafaae2326a1d723a92345ff7f503451963edd403198c9d5a5fc43bfd46626c745357440bd1a302b4c7d1faa9d75850c91fef5fd24e1bc6165109c26ab0f