Analysis
-
max time kernel
137s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 01:35
Behavioral task
behavioral1
Sample
426deeb82fedba748adf56b8df9b5566.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
426deeb82fedba748adf56b8df9b5566.exe
Resource
win10v2004-20231215-en
General
-
Target
426deeb82fedba748adf56b8df9b5566.exe
-
Size
1.3MB
-
MD5
426deeb82fedba748adf56b8df9b5566
-
SHA1
c21d5e333257f1cc298590ac57f14501a18ef98f
-
SHA256
6109c0c0c6ea059e0fef926cf7366abe2f11a1e7bff22556d445fde88c747298
-
SHA512
eb8b6ba969a3a0c62c4bcbfdafcc256249f249315d4f4e30fc96995c58d236b9b1b6d741bf7ceaf222a39a4872a4d3abeee40aac5fa310d5dc0d47d6e0980b1e
-
SSDEEP
24576:ICAtkGvd9zxnRfYerDHMjf+5jj9qT0Vo1is/lD0C8wn8AzKkIV9QNYRqKvG:C99FYePL9j9qwVoTD0Cn8AzTIPqkq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1884 426deeb82fedba748adf56b8df9b5566.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 426deeb82fedba748adf56b8df9b5566.exe -
resource yara_rule behavioral2/memory/4668-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000600000001e0ce-12.dat upx behavioral2/memory/1884-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4668 426deeb82fedba748adf56b8df9b5566.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4668 426deeb82fedba748adf56b8df9b5566.exe 1884 426deeb82fedba748adf56b8df9b5566.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1884 4668 426deeb82fedba748adf56b8df9b5566.exe 90 PID 4668 wrote to memory of 1884 4668 426deeb82fedba748adf56b8df9b5566.exe 90 PID 4668 wrote to memory of 1884 4668 426deeb82fedba748adf56b8df9b5566.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\426deeb82fedba748adf56b8df9b5566.exe"C:\Users\Admin\AppData\Local\Temp\426deeb82fedba748adf56b8df9b5566.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\426deeb82fedba748adf56b8df9b5566.exeC:\Users\Admin\AppData\Local\Temp\426deeb82fedba748adf56b8df9b5566.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1884
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5671401b0eddce9d8c850224b59d698d3
SHA119601adb9827d0f16998582f8e4c1895a9ea30ef
SHA2563eeb3279cfbb396cbb10d008916e03da8ac3f9050c9dcb008f0d3531fcc5715d
SHA512a4f183471ae712dc4b7d84cbf9e1ed0874b218e4ab7844bbd12e8bb725a65e9112e65f5f5f9bd50c3af924acfd74896c5c6f3360ff5f071e9dd4944a967c0593