Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
5462c136627232deaf6847aa14e9803e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5462c136627232deaf6847aa14e9803e.exe
Resource
win10v2004-20231222-en
General
-
Target
5462c136627232deaf6847aa14e9803e.exe
-
Size
82KB
-
MD5
5462c136627232deaf6847aa14e9803e
-
SHA1
cecf584fd47728ad31a6ad47bb89a5ac9b2e4b57
-
SHA256
c2251fd8b028208600797349c3f60088a3176b2ab9ff6e26c428b67956da22a2
-
SHA512
1191de376ec2d79ffae00e8251a23c08f9667568a4b8b79f2014d8350671224d0d0bdf5bd989f7ff9527a56ea3040124691f54e0f62c9904e383c92a877f8602
-
SSDEEP
1536:YIXhO8Siuh9D2eJy7KLmB4ogsQBUIIpzdV9wYup4mAQmzvw4avfVWiUUGa2:YshO8SiuhpfBLmBngsQBUIohVzucvw7u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1172 5462c136627232deaf6847aa14e9803e.exe -
Executes dropped EXE 1 IoCs
pid Process 1172 5462c136627232deaf6847aa14e9803e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 5462c136627232deaf6847aa14e9803e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2292 5462c136627232deaf6847aa14e9803e.exe 1172 5462c136627232deaf6847aa14e9803e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1172 2292 5462c136627232deaf6847aa14e9803e.exe 89 PID 2292 wrote to memory of 1172 2292 5462c136627232deaf6847aa14e9803e.exe 89 PID 2292 wrote to memory of 1172 2292 5462c136627232deaf6847aa14e9803e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5462c136627232deaf6847aa14e9803e.exe"C:\Users\Admin\AppData\Local\Temp\5462c136627232deaf6847aa14e9803e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\5462c136627232deaf6847aa14e9803e.exeC:\Users\Admin\AppData\Local\Temp\5462c136627232deaf6847aa14e9803e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD584237f0d00f59e215dbc13fe8ba43040
SHA1af9a9392270e5e0f7cc89c9913c574c6efc4524f
SHA256c83c7f245f08e58839bba819619e8282532cf44633398e17cea4239b4420c3b3
SHA512be3385afac481848023d3c4829561679c93046bb94aee0d1933c6ab945f8138eb1a6b316937f1b77cd502828cabef9e675e64e131c004ee1401ab7e772a63df0