Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 08:38
Behavioral task
behavioral1
Sample
4af54cee210af8711a3e2a36d11024ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4af54cee210af8711a3e2a36d11024ed.exe
Resource
win10v2004-20231222-en
General
-
Target
4af54cee210af8711a3e2a36d11024ed.exe
-
Size
2.7MB
-
MD5
4af54cee210af8711a3e2a36d11024ed
-
SHA1
edba36f807d03f7ae05458bf642187761cf6eae8
-
SHA256
fc47febee87aa418de83c92f12569fa9159cc1076e6896f347eae6e5a676f787
-
SHA512
bc1045af0afa9ac1ebda3e9175713d56c218e48898c6df4763933045a126db5c42f3b5ca5c6d8cddb8fc031121865440f0821dfa7f48514480cf82d07af6079c
-
SSDEEP
49152:5fNgXmHSzy2xal7pc0grQLMR91UKTw9zEzeaxuiluUY9R9j:xYc2AFpR/4H1UKMezXY+cHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4408 4af54cee210af8711a3e2a36d11024ed.exe -
Executes dropped EXE 1 IoCs
pid Process 4408 4af54cee210af8711a3e2a36d11024ed.exe -
resource yara_rule behavioral2/memory/1640-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000400000001e630-11.dat upx behavioral2/memory/4408-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1640 4af54cee210af8711a3e2a36d11024ed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1640 4af54cee210af8711a3e2a36d11024ed.exe 4408 4af54cee210af8711a3e2a36d11024ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4408 1640 4af54cee210af8711a3e2a36d11024ed.exe 15 PID 1640 wrote to memory of 4408 1640 4af54cee210af8711a3e2a36d11024ed.exe 15 PID 1640 wrote to memory of 4408 1640 4af54cee210af8711a3e2a36d11024ed.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af54cee210af8711a3e2a36d11024ed.exe"C:\Users\Admin\AppData\Local\Temp\4af54cee210af8711a3e2a36d11024ed.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\4af54cee210af8711a3e2a36d11024ed.exeC:\Users\Admin\AppData\Local\Temp\4af54cee210af8711a3e2a36d11024ed.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a96e25172207e107a1f9fd973ccf5a57
SHA1ecdaf8cd495e7262b92383ff6512c332378376b2
SHA25643ec83d1a8f404777a803bbc0331079a169fda3622809018abcac8dd77dc445c
SHA5122f122d6d278ee4912f0b4d14c05a5ae2735ba1ffb74c37303cfec72e5a28a76b87757168dda11d96b6f05c7ecf9bfe5bd231eeb3185382d25223d385f816513f