Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
4aca9ca223bf71a500e8d83f1c9ef13c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4aca9ca223bf71a500e8d83f1c9ef13c.exe
Resource
win10v2004-20231222-en
General
-
Target
4aca9ca223bf71a500e8d83f1c9ef13c.exe
-
Size
82KB
-
MD5
4aca9ca223bf71a500e8d83f1c9ef13c
-
SHA1
6bd75fca8a818bef793eac2c6cb57ba990fc5df3
-
SHA256
08f54db83e36008df287be4b892190cff928139e2a2af58e2b2c463f7f3db6dc
-
SHA512
15f6b1b0274cd452278a6dd196064e3cbf7ffac97ecad00f9d7d6cd7a0a0a13f0fcd941104c744425e19c39d16291825d7a6732c63856d46df9a8cb45435d2e6
-
SSDEEP
1536:fh2wyE3J8QsxdCyP22zfi5axtErb/oIiuNXiPu7VeQBViGi9tZVtK5Ea:5NF3CQs+e22zyQiP/o92dNi9tR9a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4760 4aca9ca223bf71a500e8d83f1c9ef13c.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 4aca9ca223bf71a500e8d83f1c9ef13c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 540 4aca9ca223bf71a500e8d83f1c9ef13c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 540 4aca9ca223bf71a500e8d83f1c9ef13c.exe 4760 4aca9ca223bf71a500e8d83f1c9ef13c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 4760 540 4aca9ca223bf71a500e8d83f1c9ef13c.exe 92 PID 540 wrote to memory of 4760 540 4aca9ca223bf71a500e8d83f1c9ef13c.exe 92 PID 540 wrote to memory of 4760 540 4aca9ca223bf71a500e8d83f1c9ef13c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aca9ca223bf71a500e8d83f1c9ef13c.exe"C:\Users\Admin\AppData\Local\Temp\4aca9ca223bf71a500e8d83f1c9ef13c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\4aca9ca223bf71a500e8d83f1c9ef13c.exeC:\Users\Admin\AppData\Local\Temp\4aca9ca223bf71a500e8d83f1c9ef13c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD581fbfcdee13e3e737ede569301bf8cca
SHA10a88b4e9baf909a0ddd599709e392acac7e28361
SHA256e080c785a6ed07f8a5b1ebcde8817f2c87ccebdbccaf61528fa39e32cc7b4012
SHA512fee3b10acafa00dcacbef334b6a316c0374317203aa3a3723bba6abc4026fcbafde4a872fe11a860b1d8b165697f31b941831eba47f93e2e447f4c9d68dab8da