Analysis
-
max time kernel
147s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 12:36
Behavioral task
behavioral1
Sample
4e523961878f10508358260aeb9eb02c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e523961878f10508358260aeb9eb02c.exe
Resource
win10v2004-20231222-en
General
-
Target
4e523961878f10508358260aeb9eb02c.exe
-
Size
1.3MB
-
MD5
4e523961878f10508358260aeb9eb02c
-
SHA1
ac78c344fcc513f31590aacd5359cd535a1d9054
-
SHA256
57e6e35a64fc68a910ec335d41337f649438d7628f43a6d8d9f3242785f6686d
-
SHA512
b51111fc6aed1351d1982e4a3dbb27797ac34756f3b110bfca4c4a57a9655d604d4e4fe82d23bb74416f4e284025c77aab237d9ced3c36f762bc89dd08210008
-
SSDEEP
24576:b50Wnt53b4kaDEPI6ZE8zE6lr2R2/QR/PVCiGDjf6upvgdSIc+M8joz2a4Wc:B/3b4TDEPjZTE6lr/QRn9GDD68gLolYp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 4e523961878f10508358260aeb9eb02c.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 4e523961878f10508358260aeb9eb02c.exe -
resource yara_rule behavioral2/memory/3008-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2344-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002323c-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 4e523961878f10508358260aeb9eb02c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3008 4e523961878f10508358260aeb9eb02c.exe 2344 4e523961878f10508358260aeb9eb02c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2344 3008 4e523961878f10508358260aeb9eb02c.exe 21 PID 3008 wrote to memory of 2344 3008 4e523961878f10508358260aeb9eb02c.exe 21 PID 3008 wrote to memory of 2344 3008 4e523961878f10508358260aeb9eb02c.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e523961878f10508358260aeb9eb02c.exe"C:\Users\Admin\AppData\Local\Temp\4e523961878f10508358260aeb9eb02c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\4e523961878f10508358260aeb9eb02c.exeC:\Users\Admin\AppData\Local\Temp\4e523961878f10508358260aeb9eb02c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d60df832c8020cfe05dec46020790501
SHA1df7b1efa01dbb29c97687a1cb69861654311d33e
SHA2563df8d21cef54fc482aa91b408a3ff4765f1c151742cde1f1d165cd3c56841ed5
SHA5128d69da5c5dfc025a55b92d1eb80d4f5f556e5837bae31f6cfe4ccd2ad4399327705cb7e088a848b2982780cad5780d3465a5e32c32844716255a7fdc9bc6721b