Analysis

  • max time kernel
    156s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 21:01

General

  • Target

    446e3bf472deba2d4045a0415292c719.exe

  • Size

    82KB

  • MD5

    446e3bf472deba2d4045a0415292c719

  • SHA1

    e8c1049da457fb9d7fb635198d0a82a34126e426

  • SHA256

    4fae8595f927eb4aa1f36e9da2c90d3d435cf29a38e11c4516be55a5f5ad61b0

  • SHA512

    70ee2908cc9e02baf8204743fe9975f0e922ff3da2d3f2da6a061a3eb70f32b48c405151c5c4f3d92a2debb46f4a212c6fcd6216f4613d2728ecd7e6f7c8d670

  • SSDEEP

    1536:i/IBpdKzNlfrlTqz3ff4FLV8jSB3Ar12W/3ZpJTEfdfBQxlDpc:uIjdKB5r230mSs8C3h6eq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe
    "C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe
      C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1492

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\446e3bf472deba2d4045a0415292c719.exe

          Filesize

          82KB

          MD5

          7cb4dc354b0a290333d13fd82ba2b739

          SHA1

          1b1d107b72c6dc252552f96534cf76e75d793576

          SHA256

          df186b3bae76920d812cce8c07273f3f94a2545d964a6d3a14f60d2c1a8c6f0c

          SHA512

          dcbb1b58c437d10c622e69816c9424c2a55e28096f8a073a363e2725cfede18c35cb4c6cafbe4c1039a27d53c8b7eca1b8dec51f814696a69bf24563fbb4f991

        • memory/1492-13-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1492-14-0x00000000001D0000-0x00000000001FF000-memory.dmp

          Filesize

          188KB

        • memory/1492-20-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1492-25-0x00000000014F0000-0x000000000150B000-memory.dmp

          Filesize

          108KB

        • memory/1968-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1968-1-0x00000000000F0000-0x000000000011F000-memory.dmp

          Filesize

          188KB

        • memory/1968-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1968-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB