Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
4db1b5a3dd56bd6087c3f32a4cc47d55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4db1b5a3dd56bd6087c3f32a4cc47d55.exe
Resource
win10v2004-20231222-en
General
-
Target
4db1b5a3dd56bd6087c3f32a4cc47d55.exe
-
Size
82KB
-
MD5
4db1b5a3dd56bd6087c3f32a4cc47d55
-
SHA1
4805dd528a8eb10263eb3f4cab76f349f6282445
-
SHA256
4b6ccdf6d8335b0cf100ff58a391e3e128e9d5741467afde47e863dabd347f66
-
SHA512
8b8a7c60d086d06278975436de75b623953daf6f171d60c5b2dff1f99456bc4d9d95ea4699b44b5effbe5b873a645d89fe82fe86a1d33bbead2b3caba7954e72
-
SSDEEP
1536:w43+PWpySv+rn5+whCxiIKM7oIDzy/F0tvseftM37ggJX3R8doJ9/6WKS:33+u8zL5+9xVfD7tEefkfR8KQWKS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2140 4db1b5a3dd56bd6087c3f32a4cc47d55.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 4db1b5a3dd56bd6087c3f32a4cc47d55.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe 2140 4db1b5a3dd56bd6087c3f32a4cc47d55.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2140 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe 29 PID 3004 wrote to memory of 2140 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe 29 PID 3004 wrote to memory of 2140 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe 29 PID 3004 wrote to memory of 2140 3004 4db1b5a3dd56bd6087c3f32a4cc47d55.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4db1b5a3dd56bd6087c3f32a4cc47d55.exe"C:\Users\Admin\AppData\Local\Temp\4db1b5a3dd56bd6087c3f32a4cc47d55.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\4db1b5a3dd56bd6087c3f32a4cc47d55.exeC:\Users\Admin\AppData\Local\Temp\4db1b5a3dd56bd6087c3f32a4cc47d55.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55421b727d3d89ba56a295bed18953cf5
SHA125635c89f87158b55eab1c694c01db26b077aba7
SHA2560f8d2df8a596999186a4acea466a2d895693c44c2def820c69d88efb1a2e3689
SHA51229f67fd1f7f9319455d742b1f0f8f19560246d03b756519df7c5896fc3af6c9a415107f96a4cfc8db934100ceb7c902f4e14990c5fd75bd671500779ccffb64a