Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 13:04
Behavioral task
behavioral1
Sample
568988885485e566bf7141d15266021e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
568988885485e566bf7141d15266021e.exe
Resource
win10v2004-20231215-en
General
-
Target
568988885485e566bf7141d15266021e.exe
-
Size
1.3MB
-
MD5
568988885485e566bf7141d15266021e
-
SHA1
687dc3b49e8fcc37c93b8cfbe7b4ddf71480677a
-
SHA256
f59f1d0b9ca83dd391068b561cae0cb12119cddeded9bdbd10b6468f2977cca9
-
SHA512
2f3f42695c843c73bd43fbf99f4b759dc9655b4e68494ad641c70e4322c8101577511bc364b0a00a899ceb7c94ad1c63f2d20f65348e18321c073ca92e56a1c8
-
SSDEEP
24576:5oczmhiETc7KOXNvKcccR1+0UzPR6z7BeSWj7ywhuhy5fvG:pmosc7P9ScTm3bRO7ej7Lohy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4840 568988885485e566bf7141d15266021e.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 568988885485e566bf7141d15266021e.exe -
resource yara_rule behavioral2/memory/3808-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000600000002321b-12.dat upx behavioral2/memory/4840-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3808 568988885485e566bf7141d15266021e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3808 568988885485e566bf7141d15266021e.exe 4840 568988885485e566bf7141d15266021e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3808 wrote to memory of 4840 3808 568988885485e566bf7141d15266021e.exe 91 PID 3808 wrote to memory of 4840 3808 568988885485e566bf7141d15266021e.exe 91 PID 3808 wrote to memory of 4840 3808 568988885485e566bf7141d15266021e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\568988885485e566bf7141d15266021e.exe"C:\Users\Admin\AppData\Local\Temp\568988885485e566bf7141d15266021e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\568988885485e566bf7141d15266021e.exeC:\Users\Admin\AppData\Local\Temp\568988885485e566bf7141d15266021e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD51700f1254e08904bbc98d460af280528
SHA199136d80b5726adb2a1f4775e09207490639d7b2
SHA256f57ca0ea05907018f0082dd7ac61b7d90a1f3f489593f70fd8fed5cf35ca9dad
SHA51234eab9297577f8eed046ac453f8f860934e7fe6ff2d921839da64149bde89ffebca62f6f43c726bbaf66917e805f9b4810d0a8188f73d30a148ecfa083c2293f