Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
51802a649373409e1021303b07040cb9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51802a649373409e1021303b07040cb9.exe
Resource
win10v2004-20231215-en
General
-
Target
51802a649373409e1021303b07040cb9.exe
-
Size
82KB
-
MD5
51802a649373409e1021303b07040cb9
-
SHA1
b46120924756bf92e5d42952ac765ddd14686d36
-
SHA256
da4f6042e4e431d94f0f10a6c641f1385aea53c975be3169d335b90a87af3620
-
SHA512
1ea86b0910b6ba270af2b749746b380b7fad5689c0b554f63df8481362c894c92e109b28163a16cfafcba77fcf968dda3c952a07881007ec0624ebf29b53bdf4
-
SSDEEP
1536:ifTCyJF07jpS/biBiBfHY/O6+QyTLuGFh/VTosyaDbaW3yrZGc/uHD:iuyL07VxBiBPY/Otjuwh/VTosVXaWCr4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3116 51802a649373409e1021303b07040cb9.exe -
Executes dropped EXE 1 IoCs
pid Process 3116 51802a649373409e1021303b07040cb9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4640 51802a649373409e1021303b07040cb9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4640 51802a649373409e1021303b07040cb9.exe 3116 51802a649373409e1021303b07040cb9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4640 wrote to memory of 3116 4640 51802a649373409e1021303b07040cb9.exe 92 PID 4640 wrote to memory of 3116 4640 51802a649373409e1021303b07040cb9.exe 92 PID 4640 wrote to memory of 3116 4640 51802a649373409e1021303b07040cb9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\51802a649373409e1021303b07040cb9.exe"C:\Users\Admin\AppData\Local\Temp\51802a649373409e1021303b07040cb9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\51802a649373409e1021303b07040cb9.exeC:\Users\Admin\AppData\Local\Temp\51802a649373409e1021303b07040cb9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD567bb65d436f86ddf3aca09745c232796
SHA1d7a204b800fbafd22a4ff5e72b6b4760c4a17d0d
SHA256ca420b34246cc1873266992c38ede077beef25e5b326d4e4044a48b5b535b65d
SHA51290ecb76753ba9f2d8ee41bc848e2c756702a8608bba5bd83935962812248f8a9fd8164dbda9f6aa91e76971b1461988fa51437aa50c50e3abae25617e40b596d