Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 19:32
Behavioral task
behavioral1
Sample
4f0654e8239ba325e5d3c1c1939153cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f0654e8239ba325e5d3c1c1939153cf.exe
Resource
win10v2004-20231215-en
General
-
Target
4f0654e8239ba325e5d3c1c1939153cf.exe
-
Size
1.3MB
-
MD5
4f0654e8239ba325e5d3c1c1939153cf
-
SHA1
364592b9c52d752881b5bf1984261df7dc0765c2
-
SHA256
bd40d9d726d1fb2ee273810048c8efa47f875ae8697b6661728a51b045b54066
-
SHA512
26dbcb42f9336929eebe87c02119ac77d4384f81d3c375f462780d609dede1210bb99c812237e877d8de0c66b9233eda78c2e71c8ea0aa065f3cc0b2d0d1109c
-
SSDEEP
24576:WRwqMvplG4fEgOoCvfqq+JEQiKADKTOiXQC25KvTp9hoUYU9/9Us:Dx0eEgrm/+JADniXIuV9hoQR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1984 4f0654e8239ba325e5d3c1c1939153cf.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 4f0654e8239ba325e5d3c1c1939153cf.exe -
Loads dropped DLL 1 IoCs
pid Process 1888 4f0654e8239ba325e5d3c1c1939153cf.exe -
resource yara_rule behavioral1/memory/1888-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000e000000012247-14.dat upx behavioral1/memory/1984-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1888 4f0654e8239ba325e5d3c1c1939153cf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1888 4f0654e8239ba325e5d3c1c1939153cf.exe 1984 4f0654e8239ba325e5d3c1c1939153cf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1984 1888 4f0654e8239ba325e5d3c1c1939153cf.exe 28 PID 1888 wrote to memory of 1984 1888 4f0654e8239ba325e5d3c1c1939153cf.exe 28 PID 1888 wrote to memory of 1984 1888 4f0654e8239ba325e5d3c1c1939153cf.exe 28 PID 1888 wrote to memory of 1984 1888 4f0654e8239ba325e5d3c1c1939153cf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0654e8239ba325e5d3c1c1939153cf.exe"C:\Users\Admin\AppData\Local\Temp\4f0654e8239ba325e5d3c1c1939153cf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\4f0654e8239ba325e5d3c1c1939153cf.exeC:\Users\Admin\AppData\Local\Temp\4f0654e8239ba325e5d3c1c1939153cf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5fd8af8d809d03de5679251eb46e72314
SHA106c7e88eff17f278fddab2458b184169a28a9249
SHA256aabe421b5ea24be194888ae169addf8d6eacc01fe717aee1b1ebb9329e4b2d54
SHA5126246b04ff40c5777917c9d80e195fd89058964f31febb9069b81f595161907c54e398bf58bb96c2d70fe9ac64cdcb8bf13eceb36c6f454511a47a6bdcc3d77fe