Analysis
-
max time kernel
165s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 14:32
Behavioral task
behavioral1
Sample
53c59c755d74ae9c697e0e189fcdbed5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53c59c755d74ae9c697e0e189fcdbed5.exe
Resource
win10v2004-20231215-en
General
-
Target
53c59c755d74ae9c697e0e189fcdbed5.exe
-
Size
1.3MB
-
MD5
53c59c755d74ae9c697e0e189fcdbed5
-
SHA1
cf190c4b619136a274199c60f4bde455e616fa07
-
SHA256
9aa2c9715f13a3a1ecc60cd4d8804e5967b141d63fa00506f3acbb2eb5fe6cb3
-
SHA512
53104ba6dac88b047f8b171dd900ed7a39bde218a0baac6e9fd78a51d93b0aa3e1bbc0cf3c0ed4eb15b8a2421601102bf1fffbf254f40ab5fec1590ea2482973
-
SSDEEP
24576:/ghFVw/1QAELbDBTzMkY0Bpyj5I/w6vlWnuzy6YMrqc236fCkle88oTBVRRMWO:/caApzMIB4j54VWnoRr5xlz1VRRMf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 53c59c755d74ae9c697e0e189fcdbed5.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 53c59c755d74ae9c697e0e189fcdbed5.exe -
resource yara_rule behavioral2/memory/4764-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000200000002268d-11.dat upx behavioral2/memory/2732-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4764 53c59c755d74ae9c697e0e189fcdbed5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4764 53c59c755d74ae9c697e0e189fcdbed5.exe 2732 53c59c755d74ae9c697e0e189fcdbed5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2732 4764 53c59c755d74ae9c697e0e189fcdbed5.exe 91 PID 4764 wrote to memory of 2732 4764 53c59c755d74ae9c697e0e189fcdbed5.exe 91 PID 4764 wrote to memory of 2732 4764 53c59c755d74ae9c697e0e189fcdbed5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c59c755d74ae9c697e0e189fcdbed5.exe"C:\Users\Admin\AppData\Local\Temp\53c59c755d74ae9c697e0e189fcdbed5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\53c59c755d74ae9c697e0e189fcdbed5.exeC:\Users\Admin\AppData\Local\Temp\53c59c755d74ae9c697e0e189fcdbed5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5838f808bb1c6c4ecf88ecbe0659242dc
SHA194554f8fa6980c52dab6f9b0edd79c74eda308c7
SHA2562e06b8eac3a2104d0fec0af006db3470c62c544a67370e2c9ed577914902c32a
SHA51242cdb215dc0bfb99df34088be9bab1e2e3731248594aee1a31d915495107b7d753d8a5f84c800f12f478dcbacb7df125030d62ff6da97d36ace47161e2331ec9