Analysis
-
max time kernel
135s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 06:53
Behavioral task
behavioral1
Sample
4abc70e7df5f4ab65eb33c1e68de3261.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4abc70e7df5f4ab65eb33c1e68de3261.exe
Resource
win10v2004-20231215-en
General
-
Target
4abc70e7df5f4ab65eb33c1e68de3261.exe
-
Size
1.3MB
-
MD5
4abc70e7df5f4ab65eb33c1e68de3261
-
SHA1
b8b61d2e7c33c129e33e7bb0137c1a907a412cee
-
SHA256
9fc7b2c9032ac36b374d2f795878db81d081bc7072d536681cc12c8fb2c42c5b
-
SHA512
88c2b452e1a169151f52c9fe5fa916abbf388615185e85904713f9dd7bea0634b8296b0e0f0310166e8a9c0cede710b44be7181174ef4186709d78d4b008dbec
-
SSDEEP
24576:p9RXIQks6MLb7wsgVc1Qb5LpZZqTTj3+uXETLKwWbuVmIciJSc7YHvG:p9RXItM37w+QtZETKsOLKJbuVc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3456 4abc70e7df5f4ab65eb33c1e68de3261.exe -
Executes dropped EXE 1 IoCs
pid Process 3456 4abc70e7df5f4ab65eb33c1e68de3261.exe -
resource yara_rule behavioral2/memory/776-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000001e0ce-13.dat upx behavioral2/memory/3456-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 776 4abc70e7df5f4ab65eb33c1e68de3261.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 776 4abc70e7df5f4ab65eb33c1e68de3261.exe 3456 4abc70e7df5f4ab65eb33c1e68de3261.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 776 wrote to memory of 3456 776 4abc70e7df5f4ab65eb33c1e68de3261.exe 91 PID 776 wrote to memory of 3456 776 4abc70e7df5f4ab65eb33c1e68de3261.exe 91 PID 776 wrote to memory of 3456 776 4abc70e7df5f4ab65eb33c1e68de3261.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4abc70e7df5f4ab65eb33c1e68de3261.exe"C:\Users\Admin\AppData\Local\Temp\4abc70e7df5f4ab65eb33c1e68de3261.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\4abc70e7df5f4ab65eb33c1e68de3261.exeC:\Users\Admin\AppData\Local\Temp\4abc70e7df5f4ab65eb33c1e68de3261.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52158de617f1bbdc8c28c12d30d584fff
SHA19524e4c837889ac378a06f13cf20efe4a0288ef6
SHA256b5e54ef11a334c7c430e7cf03a28420ebb731b6e926f26682e5b5948a494e8ce
SHA51218dbcb758f938493e2601a65c31da42108ead3dcd09058c4a5dfa73a682c4c8ef1a3ed48a7ac148246709174418c159543773074150898880892a77033f52efa