Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
477ba6fffbe7437c49ebbf7592115308.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
477ba6fffbe7437c49ebbf7592115308.exe
Resource
win10v2004-20231215-en
General
-
Target
477ba6fffbe7437c49ebbf7592115308.exe
-
Size
82KB
-
MD5
477ba6fffbe7437c49ebbf7592115308
-
SHA1
e10759f6e65ca8bee17c5b33af296e035c14bf33
-
SHA256
3ae0fa10b815536d4ee5222c1d22f3dd7605f2786d576a01bb5f2b49b7c2d235
-
SHA512
e6e6a450060f97e9c1f0ce81e1281a6f61e9abc6b2ee29f1ea3f513c3e9312135ad8f36779e47c86baaf24a363167a99f585d8510d7e7fc5e32422fbac6814e1
-
SSDEEP
1536:RQd3PpqcBIu+8iCkErV+eywGmNs/35cSJK8KKO8GiE6elHz68TwcK3yrQW:RcRqce0RkErtGmN7SJLHOFiE6elTNT1L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 477ba6fffbe7437c49ebbf7592115308.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 477ba6fffbe7437c49ebbf7592115308.exe -
Loads dropped DLL 1 IoCs
pid Process 2476 477ba6fffbe7437c49ebbf7592115308.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2476 477ba6fffbe7437c49ebbf7592115308.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2476 477ba6fffbe7437c49ebbf7592115308.exe 2696 477ba6fffbe7437c49ebbf7592115308.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2696 2476 477ba6fffbe7437c49ebbf7592115308.exe 29 PID 2476 wrote to memory of 2696 2476 477ba6fffbe7437c49ebbf7592115308.exe 29 PID 2476 wrote to memory of 2696 2476 477ba6fffbe7437c49ebbf7592115308.exe 29 PID 2476 wrote to memory of 2696 2476 477ba6fffbe7437c49ebbf7592115308.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe"C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exeC:\Users\Admin\AppData\Local\Temp\477ba6fffbe7437c49ebbf7592115308.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD528700434a589a5fad2a4c288b7cd8087
SHA1844ca1215da56e3ae535d285b80fc4c2ca9b7432
SHA25658a84762074a081618c85a8b5e7ed1ad34b66701630bec807a76a3c70d193a9d
SHA512e904542edbb9a4791490a58d4aed91d431666329e8d16781c69624006427803f425064afb7658789f2d2740a53c7aa3e70fcb1cc455cec76041475cb48baa981