Analysis
-
max time kernel
132s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
509291e1cb255ecf7a29b66b61034598.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
509291e1cb255ecf7a29b66b61034598.exe
Resource
win10v2004-20231222-en
General
-
Target
509291e1cb255ecf7a29b66b61034598.exe
-
Size
84KB
-
MD5
509291e1cb255ecf7a29b66b61034598
-
SHA1
f178ce3792e6bba000f1ec6e4d77257f0456251b
-
SHA256
93c910c11377073a437b4827c732fdee0f693d0e14efdfe499b2bfe741ad846b
-
SHA512
14425890badacc762140c37f739bc2df7e541506b48afd044011e3f1aaee4b8f89588c301e2d2db3abd362a43c2caca5ac10893532ef131ca7922bb8df9284d0
-
SSDEEP
1536:FWQN7KN2kleuocsVrc4b3rahSLpBui8ubFvqonukPnspvO4:FWQUAuhsdcizLpBuDUvqTgnspm4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 509291e1cb255ecf7a29b66b61034598.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1924 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1924 509291e1cb255ecf7a29b66b61034598.exe 2608 509291e1cb255ecf7a29b66b61034598.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2608 1924 509291e1cb255ecf7a29b66b61034598.exe 19 PID 1924 wrote to memory of 2608 1924 509291e1cb255ecf7a29b66b61034598.exe 19 PID 1924 wrote to memory of 2608 1924 509291e1cb255ecf7a29b66b61034598.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe"C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exeC:\Users\Admin\AppData\Local\Temp\509291e1cb255ecf7a29b66b61034598.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55663671cb017312b7a9bdf5296254831
SHA1ea11ad687d68963b7b718e9243aa8dab0b68bfde
SHA2564731078b66e0a13d0c25fa6fe1ed4631b4c43648d68c0ac9a19a461392a12959
SHA51250b4a40b60d2a784b578d63f738321e42451ed94418b22fc0e8e6819b96c3dc407abeadf5fdbc8cb4f2d671049e1b7013b702061e37bf1fd2403d1cc2c52fc7d