Analysis
-
max time kernel
169s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 09:39
Behavioral task
behavioral1
Sample
45e755057737c8be784120263eb87a2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45e755057737c8be784120263eb87a2e.exe
Resource
win10v2004-20231215-en
General
-
Target
45e755057737c8be784120263eb87a2e.exe
-
Size
1.3MB
-
MD5
45e755057737c8be784120263eb87a2e
-
SHA1
dcb880ae29941813cfcbf2cea9addacbd5326c9f
-
SHA256
f2993b781e08ecc4dc808673804a64049de45d57a5d0af6f173236badf31521d
-
SHA512
922ac5728360d55a8fcb0988720b1f1c8e217f1ac76fe464aca899e7ab200866325ff69598096fa9d6ef8dcfba236f45b544315c9e477c67eedf0c9f86cb6a01
-
SSDEEP
24576:jExhD3s867/n4RNXzl1HTSxW46VGRqemGrBEPs/uDfioddJdCZvG:j2hD336UNptTS76wqemXPwumo9A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4428 45e755057737c8be784120263eb87a2e.exe -
Executes dropped EXE 1 IoCs
pid Process 4428 45e755057737c8be784120263eb87a2e.exe -
resource yara_rule behavioral2/memory/1244-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023200-13.dat upx behavioral2/memory/4428-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1244 45e755057737c8be784120263eb87a2e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1244 45e755057737c8be784120263eb87a2e.exe 4428 45e755057737c8be784120263eb87a2e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1244 wrote to memory of 4428 1244 45e755057737c8be784120263eb87a2e.exe 91 PID 1244 wrote to memory of 4428 1244 45e755057737c8be784120263eb87a2e.exe 91 PID 1244 wrote to memory of 4428 1244 45e755057737c8be784120263eb87a2e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\45e755057737c8be784120263eb87a2e.exe"C:\Users\Admin\AppData\Local\Temp\45e755057737c8be784120263eb87a2e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\45e755057737c8be784120263eb87a2e.exeC:\Users\Admin\AppData\Local\Temp\45e755057737c8be784120263eb87a2e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5579c8352fa40769e6bc45dc93707f312
SHA149b2837dd17b4c8a8e60d913d69faa5163005feb
SHA25686895cb2f854d80a79979e71cb08091237002fc9c03fcf46505b14e9afb7476f
SHA5128abf935331e9e5d2966604cf30715c1c24d2875b3ef92c91cf3630407145e13afd5eb5e9f9e623a2f05b73f4af83be6d31d1a5a6e2b2c214271cf590bb176740