Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
47a22e2ea168fa1011ac5ecbb737ce09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47a22e2ea168fa1011ac5ecbb737ce09.exe
Resource
win10v2004-20231215-en
General
-
Target
47a22e2ea168fa1011ac5ecbb737ce09.exe
-
Size
82KB
-
MD5
47a22e2ea168fa1011ac5ecbb737ce09
-
SHA1
92d758e9e9907a43c6a68fc57e238c8af9385954
-
SHA256
9a4fe0683e02b1c9094ca08b8763b479cb9142e5d3b383a4a7f7fa1345f26c41
-
SHA512
5ac9b498012d0c197740ea8d95b77034aa7691a2e82752ab491696dd196e953dc66435df9215788121e0e6b37900b986a1949ed7d74868a1217c82d0ccf7dd23
-
SSDEEP
1536:y3e565gHWI0Pw20Qh+sYhJyhR/p7MgJqT9J3SZgdvja/On/:me565pI0DN+sYCxt69d3lja/k/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1312 47a22e2ea168fa1011ac5ecbb737ce09.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 47a22e2ea168fa1011ac5ecbb737ce09.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe 1312 47a22e2ea168fa1011ac5ecbb737ce09.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1312 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe 29 PID 2288 wrote to memory of 1312 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe 29 PID 2288 wrote to memory of 1312 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe 29 PID 2288 wrote to memory of 1312 2288 47a22e2ea168fa1011ac5ecbb737ce09.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\47a22e2ea168fa1011ac5ecbb737ce09.exe"C:\Users\Admin\AppData\Local\Temp\47a22e2ea168fa1011ac5ecbb737ce09.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\47a22e2ea168fa1011ac5ecbb737ce09.exeC:\Users\Admin\AppData\Local\Temp\47a22e2ea168fa1011ac5ecbb737ce09.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54c2160723d91fba94232e19639c877ee
SHA12fde9ba2b76e2b5ee6fdda6bbb4c43206971cb49
SHA2566cffdeacafd441000619894e75162e6bfe4a1bc8d39a005a72a744399f5ff8ac
SHA512ac398ffedd70eef266e597ddabdb781e4ba0dce1a1bd5ec6c2bfc89010181a2c524264b872c7366a691839962c96b50141de9b6e1025b77c4f74cba2c2583b54