Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 09:40
Behavioral task
behavioral1
Sample
561c0d584edca988d7b77cbad9bd180d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
561c0d584edca988d7b77cbad9bd180d.exe
Resource
win10v2004-20231215-en
General
-
Target
561c0d584edca988d7b77cbad9bd180d.exe
-
Size
5.8MB
-
MD5
561c0d584edca988d7b77cbad9bd180d
-
SHA1
0a564c6ecde14d15b08fb18258abedc07930414e
-
SHA256
b43874b8a676dad4dc19626a563bbb318f3e2db8820a6ef39595d001f12d524b
-
SHA512
ab92eeac1f7364325832632ca4f3322cf95273456b865fdb85c97a75d48c951bbe69234c2582245df55aa6fff27a6e06aff5175d8b8cfd9945e493e625c6569e
-
SSDEEP
98304:0cypyLwoXBvS+jMCxSHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNQ:0PSpNJCauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1352 561c0d584edca988d7b77cbad9bd180d.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 561c0d584edca988d7b77cbad9bd180d.exe -
resource yara_rule behavioral2/memory/1660-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1352-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000231fc-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 561c0d584edca988d7b77cbad9bd180d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1660 561c0d584edca988d7b77cbad9bd180d.exe 1352 561c0d584edca988d7b77cbad9bd180d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1352 1660 561c0d584edca988d7b77cbad9bd180d.exe 92 PID 1660 wrote to memory of 1352 1660 561c0d584edca988d7b77cbad9bd180d.exe 92 PID 1660 wrote to memory of 1352 1660 561c0d584edca988d7b77cbad9bd180d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\561c0d584edca988d7b77cbad9bd180d.exe"C:\Users\Admin\AppData\Local\Temp\561c0d584edca988d7b77cbad9bd180d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\561c0d584edca988d7b77cbad9bd180d.exeC:\Users\Admin\AppData\Local\Temp\561c0d584edca988d7b77cbad9bd180d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD54baf1b56387491770df42c9477a10f72
SHA1ef86ff8970a891b07396045199343500ad504275
SHA256db88787fe7543f30bd60fe82035ce55036a6ec417b86f3afe68ecac5b76eb921
SHA5126ad8951b08357ad770f63ea5ceaa34ba69a6f16716e792c4df6f07a020bf1a3a6ef47d74dcbe0b3f0529199a0ee5f9aa47f04376750b3a2cdc09edd69fde73f4