Analysis
-
max time kernel
149s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 15:23
Behavioral task
behavioral1
Sample
413730afbf797141e681c3c9e534ad7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
413730afbf797141e681c3c9e534ad7b.exe
Resource
win10v2004-20231215-en
General
-
Target
413730afbf797141e681c3c9e534ad7b.exe
-
Size
1.5MB
-
MD5
413730afbf797141e681c3c9e534ad7b
-
SHA1
9c485417922dd38e6901d347e2c05716567c2678
-
SHA256
b4ffd27a1debb8b307596ed6e4444e282cc8bb295556d558c856711f1848f920
-
SHA512
1e37e1030ae676a1476ac832c4f090de907a526a99d4d9774bc13cdaf0830f612cfa78461d91c75740fac0772837548e7dd40cbabc5b716141467aea48cf0841
-
SSDEEP
24576:uggy6sDs0krEuWz4RUmlTYZOYBZ8GKW3lECsFgnYMNIAq3XUNW:Q0cioUmtYZ/fNhsFgnnNjq3s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4800 413730afbf797141e681c3c9e534ad7b.exe -
Executes dropped EXE 1 IoCs
pid Process 4800 413730afbf797141e681c3c9e534ad7b.exe -
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e982-11.dat upx behavioral2/memory/4800-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2700 413730afbf797141e681c3c9e534ad7b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2700 413730afbf797141e681c3c9e534ad7b.exe 4800 413730afbf797141e681c3c9e534ad7b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4800 2700 413730afbf797141e681c3c9e534ad7b.exe 21 PID 2700 wrote to memory of 4800 2700 413730afbf797141e681c3c9e534ad7b.exe 21 PID 2700 wrote to memory of 4800 2700 413730afbf797141e681c3c9e534ad7b.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\413730afbf797141e681c3c9e534ad7b.exe"C:\Users\Admin\AppData\Local\Temp\413730afbf797141e681c3c9e534ad7b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\413730afbf797141e681c3c9e534ad7b.exeC:\Users\Admin\AppData\Local\Temp\413730afbf797141e681c3c9e534ad7b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD549f189eeb31c01061508d8e82e25d38a
SHA1148395e3d6df985c3d0c52986f4714d76a4adbcf
SHA2566c87da067ddbe1c7eeb783cd362dd9429a6e5441dd65c92b6adcffeb059471cc
SHA5120e2a6617946692d9603f1ae805d8dc378873eb0c71110fd98cfa3a54efd2848fdd1a8f381b8eedc07cce5c10995b00181be670c1e4705886823dab5dd425dc54