Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 13:15
Behavioral task
behavioral1
Sample
539e43dd97a3341d54595329e9fbfb21.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
539e43dd97a3341d54595329e9fbfb21.exe
Resource
win10v2004-20231215-en
General
-
Target
539e43dd97a3341d54595329e9fbfb21.exe
-
Size
59KB
-
MD5
539e43dd97a3341d54595329e9fbfb21
-
SHA1
267b10b074decd98742c7e9446561ce4622c4b18
-
SHA256
00a18aed439c65fec3ac0b8a7b3360cc64df7791b2cff3e68e4ba01f90ff4951
-
SHA512
bd92d76d1135698fb07468287322c669686f121b0ec6605b027f1eef37d95aef3dda86aa2b985b55f42a7d5d106a2c713bda5660f3ecd3e8c29355489d73e2ab
-
SSDEEP
1536:XP7zOtlwnQCS7snKCcb+qtqSCNSbW2h1JxvLJie:Xiwnh1nRcb+6HCopdvLJie
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 492 539e43dd97a3341d54595329e9fbfb21.exe -
Executes dropped EXE 1 IoCs
pid Process 492 539e43dd97a3341d54595329e9fbfb21.exe -
resource yara_rule behavioral2/memory/3800-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x000b000000023030-11.dat upx behavioral2/memory/492-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3800 539e43dd97a3341d54595329e9fbfb21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3800 539e43dd97a3341d54595329e9fbfb21.exe 492 539e43dd97a3341d54595329e9fbfb21.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 492 3800 539e43dd97a3341d54595329e9fbfb21.exe 91 PID 3800 wrote to memory of 492 3800 539e43dd97a3341d54595329e9fbfb21.exe 91 PID 3800 wrote to memory of 492 3800 539e43dd97a3341d54595329e9fbfb21.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\539e43dd97a3341d54595329e9fbfb21.exe"C:\Users\Admin\AppData\Local\Temp\539e43dd97a3341d54595329e9fbfb21.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\539e43dd97a3341d54595329e9fbfb21.exeC:\Users\Admin\AppData\Local\Temp\539e43dd97a3341d54595329e9fbfb21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:492
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d972533189471e4326bb7912cd76248d
SHA1f779ca5be4c8a1b175a31d66877fc27653f9bfd3
SHA2566c8457f7d9733e80500c3d6c737036092a2cecee9ce263baf66700357c0c0b45
SHA512c6944f9c0c228e14aaafa333cfd067b976c853d29ae2ad600b4ac01ddcb3043394921be028916fc767bc7e81c65f5271e01841ef491ab9a3440f8c278e75dd80