Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 12:58
Behavioral task
behavioral1
Sample
4b7fe687014aaf8abfb868a9128f7d22.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b7fe687014aaf8abfb868a9128f7d22.exe
Resource
win10v2004-20231215-en
General
-
Target
4b7fe687014aaf8abfb868a9128f7d22.exe
-
Size
1.3MB
-
MD5
4b7fe687014aaf8abfb868a9128f7d22
-
SHA1
d5c6b0379e2567b82f70499ec9d1606ff6b561f3
-
SHA256
021286963ce2840fb2fe5ac1a464b69b1d7a20f68f7431db24db841a0d5a015e
-
SHA512
b59b483ff7f99c4fa9c56381983b62ebf9141dce8e94dedee126b43627f42a23b7a1595f462d4ca745b19ef8ba916ed05cd33ca68a8597b0449128bfcee03c43
-
SSDEEP
24576:eXZNCFqJ6W6bbHkr7PKaCWRwFNcZzmjM3QcnzVlmHysakqGWrZ+DBEvG:cUFqJ69bQCvIzmjVKWHy+D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 4b7fe687014aaf8abfb868a9128f7d22.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 4b7fe687014aaf8abfb868a9128f7d22.exe -
resource yara_rule behavioral2/memory/4464-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00070000000231fc-12.dat upx behavioral2/memory/2384-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4464 4b7fe687014aaf8abfb868a9128f7d22.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4464 4b7fe687014aaf8abfb868a9128f7d22.exe 2384 4b7fe687014aaf8abfb868a9128f7d22.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2384 4464 4b7fe687014aaf8abfb868a9128f7d22.exe 35 PID 4464 wrote to memory of 2384 4464 4b7fe687014aaf8abfb868a9128f7d22.exe 35 PID 4464 wrote to memory of 2384 4464 4b7fe687014aaf8abfb868a9128f7d22.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b7fe687014aaf8abfb868a9128f7d22.exe"C:\Users\Admin\AppData\Local\Temp\4b7fe687014aaf8abfb868a9128f7d22.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\4b7fe687014aaf8abfb868a9128f7d22.exeC:\Users\Admin\AppData\Local\Temp\4b7fe687014aaf8abfb868a9128f7d22.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5b1e65bb86ea7148363091e515066baf7
SHA1a07c5006a5449baf0b9d3689bbc4d680e88f083e
SHA25670f30337032a0e2808d7865c02756e0fa27b4d8a74753b8b2db5538a11a2acec
SHA512b2e367a3da09f48f7896f43a3cafe8f6fc9d65285d86a461574be29530214b44d2b2c22f88c568f84e2130d926c9947e56b7b74a546834888b016f07d4799576