Analysis
-
max time kernel
156s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
446e3bf472deba2d4045a0415292c719.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
446e3bf472deba2d4045a0415292c719.exe
Resource
win10v2004-20231215-en
General
-
Target
446e3bf472deba2d4045a0415292c719.exe
-
Size
82KB
-
MD5
446e3bf472deba2d4045a0415292c719
-
SHA1
e8c1049da457fb9d7fb635198d0a82a34126e426
-
SHA256
4fae8595f927eb4aa1f36e9da2c90d3d435cf29a38e11c4516be55a5f5ad61b0
-
SHA512
70ee2908cc9e02baf8204743fe9975f0e922ff3da2d3f2da6a061a3eb70f32b48c405151c5c4f3d92a2debb46f4a212c6fcd6216f4613d2728ecd7e6f7c8d670
-
SSDEEP
1536:i/IBpdKzNlfrlTqz3ff4FLV8jSB3Ar12W/3ZpJTEfdfBQxlDpc:uIjdKB5r230mSs8C3h6eq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1492 446e3bf472deba2d4045a0415292c719.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 446e3bf472deba2d4045a0415292c719.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 446e3bf472deba2d4045a0415292c719.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 446e3bf472deba2d4045a0415292c719.exe 1492 446e3bf472deba2d4045a0415292c719.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1492 1968 446e3bf472deba2d4045a0415292c719.exe 89 PID 1968 wrote to memory of 1492 1968 446e3bf472deba2d4045a0415292c719.exe 89 PID 1968 wrote to memory of 1492 1968 446e3bf472deba2d4045a0415292c719.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe"C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exeC:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1492
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD57cb4dc354b0a290333d13fd82ba2b739
SHA11b1d107b72c6dc252552f96534cf76e75d793576
SHA256df186b3bae76920d812cce8c07273f3f94a2545d964a6d3a14f60d2c1a8c6f0c
SHA512dcbb1b58c437d10c622e69816c9424c2a55e28096f8a073a363e2725cfede18c35cb4c6cafbe4c1039a27d53c8b7eca1b8dec51f814696a69bf24563fbb4f991