Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
4f39b8bc3c5983e78f85aface3416e57.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f39b8bc3c5983e78f85aface3416e57.exe
Resource
win10v2004-20231215-en
General
-
Target
4f39b8bc3c5983e78f85aface3416e57.exe
-
Size
82KB
-
MD5
4f39b8bc3c5983e78f85aface3416e57
-
SHA1
fb5fb584ddeb9c201f5ae283ee3d07bf98d25bd9
-
SHA256
ca085526d394b6bf014396e613a55d463b1a6a8197b510b6ba69ea9d34df7cfb
-
SHA512
952a9d924c2186f2de402d55d66dd7a4fb077bcd2ddd43e1f0cc4201883b4b5c1bc998c5bf32b4445d3f2b70b51f3939ac3a93c1252aa7d301b8343cabc28ed9
-
SSDEEP
1536:MhwUL2keS6tzKcPBLQZ50lIZ/4JSbeHGlKCXdBeLU6v+FU2fWPzR54MHP7H18Wx+:qwUL2keS6llPBLLlIZ/4MeHGbuoVF/uk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 4f39b8bc3c5983e78f85aface3416e57.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 4f39b8bc3c5983e78f85aface3416e57.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2688 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2688 4f39b8bc3c5983e78f85aface3416e57.exe 2608 4f39b8bc3c5983e78f85aface3416e57.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2608 2688 4f39b8bc3c5983e78f85aface3416e57.exe 30 PID 2688 wrote to memory of 2608 2688 4f39b8bc3c5983e78f85aface3416e57.exe 30 PID 2688 wrote to memory of 2608 2688 4f39b8bc3c5983e78f85aface3416e57.exe 30 PID 2688 wrote to memory of 2608 2688 4f39b8bc3c5983e78f85aface3416e57.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe"C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exeC:\Users\Admin\AppData\Local\Temp\4f39b8bc3c5983e78f85aface3416e57.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56fe42ea314e7009b08d76d736f4975e2
SHA1e50c32d09ae5d0902ab6b208648308d4547bed85
SHA2568dac3c4f1d53cc95082293e2e3e8712fd3bc414ffe1d3234319d88b0d026b550
SHA51262e87f17b0b213ee3d2fdea2ed680dd526ce45993f9cee5ccf0543e385ad54177136646ddb9f624452952323bc330c7635336b169189f53c673f6a45e8d3716f