Analysis
-
max time kernel
147s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 21:12
Behavioral task
behavioral1
Sample
47309788d158da4972ee39c47b92dcbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47309788d158da4972ee39c47b92dcbc.exe
Resource
win10v2004-20231215-en
General
-
Target
47309788d158da4972ee39c47b92dcbc.exe
-
Size
1.3MB
-
MD5
47309788d158da4972ee39c47b92dcbc
-
SHA1
3384d5854fcdfee5bb78a39240c77e388a087bef
-
SHA256
eb3adad4bfd89d88c8887e2bcf8cc9edd8f83869639669e517e3523f579b8ab4
-
SHA512
5394f512031e211de99895fd4180036413252a5f9b24d3adb67614db55793d8827a56970311e38f65bd0374ad887b8b580c3dd1d946553a2c9c10b21a69ac1ec
-
SSDEEP
24576:c7js4WLGgbRIb5hHEEC6yO8wM50oxOcO73iL4aLJSFYaV4zDIvG:iMGgbRI/FWye/xOcO73iLbOV4n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4996 47309788d158da4972ee39c47b92dcbc.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 47309788d158da4972ee39c47b92dcbc.exe -
resource yara_rule behavioral2/memory/4964-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000001e0ce-13.dat upx behavioral2/memory/4996-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4964 47309788d158da4972ee39c47b92dcbc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4964 47309788d158da4972ee39c47b92dcbc.exe 4996 47309788d158da4972ee39c47b92dcbc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4996 4964 47309788d158da4972ee39c47b92dcbc.exe 93 PID 4964 wrote to memory of 4996 4964 47309788d158da4972ee39c47b92dcbc.exe 93 PID 4964 wrote to memory of 4996 4964 47309788d158da4972ee39c47b92dcbc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\47309788d158da4972ee39c47b92dcbc.exe"C:\Users\Admin\AppData\Local\Temp\47309788d158da4972ee39c47b92dcbc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\47309788d158da4972ee39c47b92dcbc.exeC:\Users\Admin\AppData\Local\Temp\47309788d158da4972ee39c47b92dcbc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5da8ebb6d849917d212e337e75b232b00
SHA1d187738dce19b8cde9d370b2d738d295f5ff866f
SHA25690933d50c255d313fdd14f338a656e567ea9f112138db5d7792dda3ae8c35825
SHA5124546ac4d5627145222c46ff62ed63446b8e46126540a685ec5492d5c3a13c44c2ebaf4146ace1a4a568785e7bf19d72c6468c507acf1a293c48244ec5e5d2910