Analysis
-
max time kernel
156s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 04:36
Behavioral task
behavioral1
Sample
454caf6a0622a34618fc5e3a6be2bc40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
454caf6a0622a34618fc5e3a6be2bc40.exe
Resource
win10v2004-20231215-en
General
-
Target
454caf6a0622a34618fc5e3a6be2bc40.exe
-
Size
1.3MB
-
MD5
454caf6a0622a34618fc5e3a6be2bc40
-
SHA1
e3a04bdf17332dd79dc7fe87b5d29fc6903838d9
-
SHA256
d053e71a12149dd19ac9446eda3be34592035d9baea1533b4d55cc6d75d3306a
-
SHA512
2d6644deb9380085d9d29fdbb4e224b3d4a2dea43d00a5ce3812930dfbaa8bec4c496e814bda0f4ca8f352716be2c78bf07163130c75246987b5e0fad7a4dd62
-
SSDEEP
24576:vEt4mB7HFytBMfRaSlip4AewLXzYPUHRTxUG5lOV4EvG:4FotWJgHLMPux1Hw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4992 454caf6a0622a34618fc5e3a6be2bc40.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 454caf6a0622a34618fc5e3a6be2bc40.exe -
resource yara_rule behavioral2/memory/4224-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000001e0ce-12.dat upx behavioral2/memory/4992-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4224 454caf6a0622a34618fc5e3a6be2bc40.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4224 454caf6a0622a34618fc5e3a6be2bc40.exe 4992 454caf6a0622a34618fc5e3a6be2bc40.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4992 4224 454caf6a0622a34618fc5e3a6be2bc40.exe 91 PID 4224 wrote to memory of 4992 4224 454caf6a0622a34618fc5e3a6be2bc40.exe 91 PID 4224 wrote to memory of 4992 4224 454caf6a0622a34618fc5e3a6be2bc40.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\454caf6a0622a34618fc5e3a6be2bc40.exe"C:\Users\Admin\AppData\Local\Temp\454caf6a0622a34618fc5e3a6be2bc40.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\454caf6a0622a34618fc5e3a6be2bc40.exeC:\Users\Admin\AppData\Local\Temp\454caf6a0622a34618fc5e3a6be2bc40.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5bdb85d00d9d57dab0bbd1d51c625eaa8
SHA1d4406a2fdc9d6bf41bdbaf341081d5c6229c8a6e
SHA25692a30ceb818366d87a8b7667b79c139cfeee79143bb520d4807f380f0f1c1218
SHA51245a5e1461da2f0e67b5dcb9dc3203803c7c3853d70f7bf8d9d69913cf321f7005aef35484052f00c6f66770dadcd51637119c3a97aa1a7adb9f4e6c9b226be03