Analysis
-
max time kernel
148s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
4e426867846a531e9151c6d306850539.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e426867846a531e9151c6d306850539.exe
Resource
win10v2004-20231215-en
General
-
Target
4e426867846a531e9151c6d306850539.exe
-
Size
3.3MB
-
MD5
4e426867846a531e9151c6d306850539
-
SHA1
233d38cd2b5370ebde7eb26bab44f5be8c3c445a
-
SHA256
e16dac5302414c67e0250a3871fda8448e5d4ee145b8b8c49cc34b1d5d8f02d6
-
SHA512
68633fdb5a6ff9d4e8b0cdc8b1073e22ece27fba6a5bb90ac93bc6713130f3208ddcb93fe9efc7b7c6c6960af3113fb064c16c3de7cb730a1cabcd7d9d50d8e8
-
SSDEEP
98304:c0GwZNNpQmDgCTZn2pjJl24d6Yd4S+D845wVmE8G4T2O:gwBp/g0n2pjDBd4r845wVmE94Tr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 4e426867846a531e9151c6d306850539.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 4e426867846a531e9151c6d306850539.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4292 4e426867846a531e9151c6d306850539.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4292 4e426867846a531e9151c6d306850539.exe 1756 4e426867846a531e9151c6d306850539.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1756 4292 4e426867846a531e9151c6d306850539.exe 39 PID 4292 wrote to memory of 1756 4292 4e426867846a531e9151c6d306850539.exe 39 PID 4292 wrote to memory of 1756 4292 4e426867846a531e9151c6d306850539.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e426867846a531e9151c6d306850539.exe"C:\Users\Admin\AppData\Local\Temp\4e426867846a531e9151c6d306850539.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\4e426867846a531e9151c6d306850539.exeC:\Users\Admin\AppData\Local\Temp\4e426867846a531e9151c6d306850539.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD582600aa46dab063416369597451810c6
SHA1916bf4f762c7f03299580d4ca60113f48f0d3800
SHA256cd414c186a6338c13746737b92598774987b88bd830d9138ff887a8b1f52d372
SHA512f2db13977abaa051b360857ba9f1505039a6ffbf2e5c69265e3fa573ec17d22734480fa8d335c8c7bbf33c710c85245c5a9d6326327e1cf709dff3f4b1234fcc