Analysis
-
max time kernel
158s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
4b8d477e630d1ad2e17f9b57ffcec7ef.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b8d477e630d1ad2e17f9b57ffcec7ef.exe
Resource
win10v2004-20231215-en
General
-
Target
4b8d477e630d1ad2e17f9b57ffcec7ef.exe
-
Size
200KB
-
MD5
4b8d477e630d1ad2e17f9b57ffcec7ef
-
SHA1
cd891350859104192f1df31c92f50498e74cf24d
-
SHA256
6b5e715aa6e5fbc9e1f34c20ce0e076eecabb645a10d8ceba46fdf4062bae12f
-
SHA512
c00472e52f3bf5056a4d92fa7ccbff7d26a63cabf7ed6f8fb2a91934c832eb0aac092e87640302fffcbf909f3794c81c4d91532d23213e619a11a5a15821241a
-
SSDEEP
3072:28xnWoVz6gfXMY6L/icu4zLWTcc2g5oPUKIuRYFZjQTGLKOwCIuqhHTiWMUBd5HE:t5UPLtu4GT0gfLHLnchHey7ZoRvXJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4516 4b8d477e630d1ad2e17f9b57ffcec7ef.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 4b8d477e630d1ad2e17f9b57ffcec7ef.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 4b8d477e630d1ad2e17f9b57ffcec7ef.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4616 4b8d477e630d1ad2e17f9b57ffcec7ef.exe 4516 4b8d477e630d1ad2e17f9b57ffcec7ef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4516 4616 4b8d477e630d1ad2e17f9b57ffcec7ef.exe 89 PID 4616 wrote to memory of 4516 4616 4b8d477e630d1ad2e17f9b57ffcec7ef.exe 89 PID 4616 wrote to memory of 4516 4616 4b8d477e630d1ad2e17f9b57ffcec7ef.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8d477e630d1ad2e17f9b57ffcec7ef.exe"C:\Users\Admin\AppData\Local\Temp\4b8d477e630d1ad2e17f9b57ffcec7ef.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\4b8d477e630d1ad2e17f9b57ffcec7ef.exeC:\Users\Admin\AppData\Local\Temp\4b8d477e630d1ad2e17f9b57ffcec7ef.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD51292e3777311a3403b94dcdb80d80c70
SHA16d87eeb3cf8fe0ee1bc7373262b8001aece8bfa2
SHA2562dba87653ab2c4bc1463beb2858c035c46cbbc445e6090405bf8e183387f3f1b
SHA512db2fb84458116f54870d5fbccabb354b8ce2db796992b6e76cf34be12bc3725bd262700fc055ffa2c716ca3f4c24b573fc0902e7668db2b941f7465e2da8ee2a