Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
4a6151bb182146eaf6ed88fae87201c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a6151bb182146eaf6ed88fae87201c1.exe
Resource
win10v2004-20231222-en
General
-
Target
4a6151bb182146eaf6ed88fae87201c1.exe
-
Size
84KB
-
MD5
4a6151bb182146eaf6ed88fae87201c1
-
SHA1
7e00cd3a1b6c4853007970388454d63411cebe50
-
SHA256
e118d608c766f3171bfb2dd132b32b856de53c38c7d485a817b8bccdc5eeec10
-
SHA512
94ec7a8f4c4a445d441272c01221d92d2936ba2c9925acc04432fc14906ecaf97da76db247477721b1747e62ba87cc6fe8430124151093d14587a19b13201970
-
SSDEEP
1536:K4F7Q+3/zUuej8T33oQiT1gvunCiuyOjqgUKCIqxuAn2s5ufEwcq669Cy:K4LzUVAIT1/m+rKenn5C9/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 4a6151bb182146eaf6ed88fae87201c1.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 4a6151bb182146eaf6ed88fae87201c1.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 4a6151bb182146eaf6ed88fae87201c1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2236 4a6151bb182146eaf6ed88fae87201c1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 4a6151bb182146eaf6ed88fae87201c1.exe 2156 4a6151bb182146eaf6ed88fae87201c1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2156 2236 4a6151bb182146eaf6ed88fae87201c1.exe 29 PID 2236 wrote to memory of 2156 2236 4a6151bb182146eaf6ed88fae87201c1.exe 29 PID 2236 wrote to memory of 2156 2236 4a6151bb182146eaf6ed88fae87201c1.exe 29 PID 2236 wrote to memory of 2156 2236 4a6151bb182146eaf6ed88fae87201c1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a6151bb182146eaf6ed88fae87201c1.exe"C:\Users\Admin\AppData\Local\Temp\4a6151bb182146eaf6ed88fae87201c1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\4a6151bb182146eaf6ed88fae87201c1.exeC:\Users\Admin\AppData\Local\Temp\4a6151bb182146eaf6ed88fae87201c1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5b0f3edb2865397e4072c94279fe09956
SHA10e58565eea66cd16c296e4eee431b0a1b6fa2308
SHA25624c22a10ffe98a81f1c1ef39e6d5713bfda348133725d170a98a983110be9ba6
SHA5125c9551cb91c6fd77ff821dd04a337e86d6cc15bc6e496aa75c2505a820b103a5d6f52461f1aa9ccf545ca64bde0c92774ceab8e24bf15347eac842b9d4b3332f