Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 07:45
Behavioral task
behavioral1
Sample
4323fa4d2c88efdd640cbfba3f3ad758.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4323fa4d2c88efdd640cbfba3f3ad758.exe
Resource
win10v2004-20231222-en
General
-
Target
4323fa4d2c88efdd640cbfba3f3ad758.exe
-
Size
1.3MB
-
MD5
4323fa4d2c88efdd640cbfba3f3ad758
-
SHA1
c989d1e9d136ca6a50d3e779016800567f31e063
-
SHA256
cab81b92b10159c61673842d780a4e6bdfb0e1272bf851b61ee25c249744bf25
-
SHA512
e57e8298cee8b2487bdd7d83ed7865f69d4f77da3c39d4019817cca3bef92fa61fc95d542694c733fd522a469ed9f0b406dc321faea1159bf5f7674aca1f899c
-
SSDEEP
24576:lBI6r1/099WPBISyiPnY+sdXpkmn5/Yxlu1lH5uqjTyikBzmWO:pZ0LNgPap3pYxlufQ6ubBzmf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 4323fa4d2c88efdd640cbfba3f3ad758.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 4323fa4d2c88efdd640cbfba3f3ad758.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2392-14-0x00000000035B0000-0x0000000003A9F000-memory.dmp upx behavioral1/files/0x000a000000013a71-15.dat upx behavioral1/files/0x000a000000013a71-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe 2996 4323fa4d2c88efdd640cbfba3f3ad758.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2996 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe 15 PID 2392 wrote to memory of 2996 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe 15 PID 2392 wrote to memory of 2996 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe 15 PID 2392 wrote to memory of 2996 2392 4323fa4d2c88efdd640cbfba3f3ad758.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\4323fa4d2c88efdd640cbfba3f3ad758.exe"C:\Users\Admin\AppData\Local\Temp\4323fa4d2c88efdd640cbfba3f3ad758.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\4323fa4d2c88efdd640cbfba3f3ad758.exeC:\Users\Admin\AppData\Local\Temp\4323fa4d2c88efdd640cbfba3f3ad758.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5aa6cdaca194787bd450105a24135d36c
SHA159f369965f9e9af25d62d8ac6b2f19b62f19245b
SHA256a00c4aac64faf7d15c878bb95882e09201187be1e1875575dbd584f6c9916f7d
SHA51213dd33a7c8b525a78f8f8294be6297d86f8ac80117389d883786f4c94bd635fc87b297c97dfb2c39f9b095f413eb099a622bee4a7fb38026f1a675bb008c6d7d
-
Filesize
131KB
MD55a338e270b92f5167d825c8e56df7be9
SHA16e8e984a24ef78c4686e562e0df1e8a2a98e9165
SHA2569fd772e676f0ca719565e8900c3a0737a4f78e495630a48614d464f3429b0282
SHA512ba2f83849184aaa8dfabc5aec57604ff3edd1c6b28f6f5762d21be2e948ccd03e51e4e797903927f0e4e4190dca24a6d3fd039007a68d06fd0dce99d5369e04f