Analysis
-
max time kernel
129s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 05:11
Behavioral task
behavioral1
Sample
455f9887d7bde0118aeaed8c41034026.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
455f9887d7bde0118aeaed8c41034026.exe
Resource
win10v2004-20231215-en
General
-
Target
455f9887d7bde0118aeaed8c41034026.exe
-
Size
1.3MB
-
MD5
455f9887d7bde0118aeaed8c41034026
-
SHA1
1d78c913e0446441608a52c4a98cba38a8772b7a
-
SHA256
12b00a12cf836fd005fceff3d025980d3bf03c924d5531f645128d6d26177697
-
SHA512
96fe3bdff9d997606854a4cd889c52767e144fff2b54e8f86414c36f14f82cf68fd12c4a2ac03c113992ba08861eab964b282cd0d051bf1543f2b836b259d6cd
-
SSDEEP
24576:6WYJyhfg5gXpLBTnRcbF7K31rX81FVDI/wzFeCmhzAwgNz028AdV4vG:6PJyhf1ZNnmG3R81buSTg++RC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 455f9887d7bde0118aeaed8c41034026.exe -
Executes dropped EXE 1 IoCs
pid Process 1296 455f9887d7bde0118aeaed8c41034026.exe -
resource yara_rule behavioral2/memory/4428-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00060000000231fa-13.dat upx behavioral2/memory/1296-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4428 455f9887d7bde0118aeaed8c41034026.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4428 455f9887d7bde0118aeaed8c41034026.exe 1296 455f9887d7bde0118aeaed8c41034026.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4428 wrote to memory of 1296 4428 455f9887d7bde0118aeaed8c41034026.exe 91 PID 4428 wrote to memory of 1296 4428 455f9887d7bde0118aeaed8c41034026.exe 91 PID 4428 wrote to memory of 1296 4428 455f9887d7bde0118aeaed8c41034026.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\455f9887d7bde0118aeaed8c41034026.exe"C:\Users\Admin\AppData\Local\Temp\455f9887d7bde0118aeaed8c41034026.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\455f9887d7bde0118aeaed8c41034026.exeC:\Users\Admin\AppData\Local\Temp\455f9887d7bde0118aeaed8c41034026.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51d5e00aa0fcbcd31a99c920495ac6764
SHA1dc039802fc1a5dfc9e5c786ff959d956d4688486
SHA256b77d6517f68755261fffad103246fa2090c3039617b0a58a0a1e99fbdbb844d4
SHA512eae82296981bd883f6cbe6b992ac0b56b18ce501788aeb20ab982b90008444d0edd450dbda4db7989b1874c49c3f4014ca45f90bf477a31578566100a49835cf