Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
525fa299b7518b873d27bd73ff228654.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
525fa299b7518b873d27bd73ff228654.exe
Resource
win10v2004-20231215-en
General
-
Target
525fa299b7518b873d27bd73ff228654.exe
-
Size
84KB
-
MD5
525fa299b7518b873d27bd73ff228654
-
SHA1
08e01bf5b6fbce3e6867069ed98de7c58c200e11
-
SHA256
b31c97c558c0d95381b48505586f63932611ae579c91d697936d831f025f4fe7
-
SHA512
bf70fb09cd41f84d71ed88cf55fa166e044734f2a8d7a0905a67a33b5a590a9cfe6c67eec69e75fd68e1caddf207bcd585af588f4111ae9d9e8e5cdba417a6f9
-
SSDEEP
1536:l1Sqo9I16esxOrR4KOEasFtF81zWLqGafeSCZ1VW2FU0ouYC12Du:l1SM1m6R4KzaMF8xcnNFU0nDsu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 525fa299b7518b873d27bd73ff228654.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 525fa299b7518b873d27bd73ff228654.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1044 525fa299b7518b873d27bd73ff228654.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1044 525fa299b7518b873d27bd73ff228654.exe 2432 525fa299b7518b873d27bd73ff228654.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2432 1044 525fa299b7518b873d27bd73ff228654.exe 92 PID 1044 wrote to memory of 2432 1044 525fa299b7518b873d27bd73ff228654.exe 92 PID 1044 wrote to memory of 2432 1044 525fa299b7518b873d27bd73ff228654.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\525fa299b7518b873d27bd73ff228654.exe"C:\Users\Admin\AppData\Local\Temp\525fa299b7518b873d27bd73ff228654.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\525fa299b7518b873d27bd73ff228654.exeC:\Users\Admin\AppData\Local\Temp\525fa299b7518b873d27bd73ff228654.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD55b0b10258a213406ff095f5f2d20ee8d
SHA1939df046d3a296cd61826640ef920e45b8ec7a89
SHA256bfdbd89549527a1d5c8376706b80a7efa2864152dfb7d9e83200b7e4676551b1
SHA51211c793f4aac03cf23b14f26dbf8f619419b59dcabf12f0c41a91ca378accb7c7439417e6e324e426688292b5e3893360e9d83754d9b2f33d7ea0cd94b7289596