Analysis
-
max time kernel
159s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
412a76659b8d5466ed46c55c09c5a8a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
412a76659b8d5466ed46c55c09c5a8a5.exe
Resource
win10v2004-20231215-en
General
-
Target
412a76659b8d5466ed46c55c09c5a8a5.exe
-
Size
82KB
-
MD5
412a76659b8d5466ed46c55c09c5a8a5
-
SHA1
dd51551383739a16c64d82dc01767faadeacb856
-
SHA256
924de32cce38495be351f45aa4f5162a88f681871d5fbe7556b7033bb8fd722c
-
SHA512
647f7af38bb0317f900a996b4541000b19d312767f4fdaefa88f663b566a58cf63566546b9fd230160a3bd870075c93f4c10f9048c82c82743a5a7ca7ae3c3b0
-
SSDEEP
1536:XRVQXEWqrcuMlBkORrzzYpDV0acz53iLOdzKkF8NhahdsXRZY7wn3:X3mbqrcbbRc0n53i0uHjfF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4556 412a76659b8d5466ed46c55c09c5a8a5.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 412a76659b8d5466ed46c55c09c5a8a5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1360 412a76659b8d5466ed46c55c09c5a8a5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1360 412a76659b8d5466ed46c55c09c5a8a5.exe 4556 412a76659b8d5466ed46c55c09c5a8a5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4556 1360 412a76659b8d5466ed46c55c09c5a8a5.exe 93 PID 1360 wrote to memory of 4556 1360 412a76659b8d5466ed46c55c09c5a8a5.exe 93 PID 1360 wrote to memory of 4556 1360 412a76659b8d5466ed46c55c09c5a8a5.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\412a76659b8d5466ed46c55c09c5a8a5.exe"C:\Users\Admin\AppData\Local\Temp\412a76659b8d5466ed46c55c09c5a8a5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\412a76659b8d5466ed46c55c09c5a8a5.exeC:\Users\Admin\AppData\Local\Temp\412a76659b8d5466ed46c55c09c5a8a5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56386de6424b4ced3361a1eaad2fbf91d
SHA11d8990c71686bd80cf7ba07661f778d889657120
SHA256f13311ec22f5f10f22064b4851cfaa9a30e5f0e6cea81605acedbf2bfa18e9dc
SHA51222aa93ef606c55e5b97638bf5760121a298c94b70ccec7f586dd66409b6807b5114e814de2438a6dff53f3d1855be87c288bd57047fb6ea81a3506aca44857e1