Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 18:10
Behavioral task
behavioral1
Sample
54387861740bc209172b031ac2efcba8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54387861740bc209172b031ac2efcba8.exe
Resource
win10v2004-20231222-en
General
-
Target
54387861740bc209172b031ac2efcba8.exe
-
Size
5.1MB
-
MD5
54387861740bc209172b031ac2efcba8
-
SHA1
688d2d226e47ebcfc2bc12ecff44af793556accf
-
SHA256
bafdd5d62eb341c8807e967e94b68ab1ff6a526184d89ac3065f56045ad8dabe
-
SHA512
1571dc6a1ce8d65e47036d04296e94e0de8021dd7fc39f76933453ac645cec1a24796b931338904eb1158637342795ef9016309453b3d12afa777792e29a276f
-
SSDEEP
98304:h++aP9zpCoTS+f4HBUCczzfFsTRFzV7m94HBUCczz9:hpU9soTsWC4GRFR7mWWCi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 54387861740bc209172b031ac2efcba8.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 54387861740bc209172b031ac2efcba8.exe -
resource yara_rule behavioral2/memory/2560-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/2764-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00080000000231f7-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2560 54387861740bc209172b031ac2efcba8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2560 54387861740bc209172b031ac2efcba8.exe 2764 54387861740bc209172b031ac2efcba8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2764 2560 54387861740bc209172b031ac2efcba8.exe 88 PID 2560 wrote to memory of 2764 2560 54387861740bc209172b031ac2efcba8.exe 88 PID 2560 wrote to memory of 2764 2560 54387861740bc209172b031ac2efcba8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\54387861740bc209172b031ac2efcba8.exe"C:\Users\Admin\AppData\Local\Temp\54387861740bc209172b031ac2efcba8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\54387861740bc209172b031ac2efcba8.exeC:\Users\Admin\AppData\Local\Temp\54387861740bc209172b031ac2efcba8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57415acbacdf92f6f04f782e41c5919f5
SHA1d8a293f9d43c9a8cc128105a63f08ee95c47121b
SHA256bcae54dbb83fd82c84569de41daa70d4b4330ca25fdd2a360652500ef5f36732
SHA51239610eaf874c20c7bc86fcc36b083ba6b695fe02e0c993f60ccb2cd369afd0a2b40e3d9ea0667c0325d5045ea4b2ab101fd38143ca798da85893507a5813b7ed