Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 14:52
Behavioral task
behavioral1
Sample
56c22b049c955d318614644c11415e19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56c22b049c955d318614644c11415e19.exe
Resource
win10v2004-20231222-en
General
-
Target
56c22b049c955d318614644c11415e19.exe
-
Size
2.7MB
-
MD5
56c22b049c955d318614644c11415e19
-
SHA1
6d54270a7e211abda3667f9c94512d7b4f6437d0
-
SHA256
4db44647eade7afd17961e63e7f8afe59ee5b6e4196584fceefc7549b63cda11
-
SHA512
2746b831a5924a7db7ea0e473c6114eea5318d2e9ccb8460c1c4f422b5b387d61736b967576ef4ba6a312e08f8dc8f3887ae0b8629df240cba730955005e6e7b
-
SSDEEP
49152:BZTKEZjgdcdL/4jgZ4QrR9ktBc1+Q4YdxSChG38bDUggR9t:DdZjgdoLg2HktBcwQDM2YIDULHt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1456 56c22b049c955d318614644c11415e19.exe -
Executes dropped EXE 1 IoCs
pid Process 1456 56c22b049c955d318614644c11415e19.exe -
resource yara_rule behavioral2/memory/1956-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000600000001e5df-11.dat upx behavioral2/memory/1456-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1956 56c22b049c955d318614644c11415e19.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1956 56c22b049c955d318614644c11415e19.exe 1456 56c22b049c955d318614644c11415e19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1456 1956 56c22b049c955d318614644c11415e19.exe 88 PID 1956 wrote to memory of 1456 1956 56c22b049c955d318614644c11415e19.exe 88 PID 1956 wrote to memory of 1456 1956 56c22b049c955d318614644c11415e19.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c22b049c955d318614644c11415e19.exe"C:\Users\Admin\AppData\Local\Temp\56c22b049c955d318614644c11415e19.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\56c22b049c955d318614644c11415e19.exeC:\Users\Admin\AppData\Local\Temp\56c22b049c955d318614644c11415e19.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1456
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD591c2e980c6a5b68c56df4f21a1dcde63
SHA1d663038017096e0d3b92a30e1b8853ec737e3bd8
SHA256f8650c3e9f84de067b014364c6de225756a934beb55f34b37a85fbb84aef04d0
SHA5129add1d2baae502d0a4c15b45d700c8dcf9e5ba243a9b5ad5c5db29fece5f1518bbd902e83d09354f2dbb1a180fb5e32f2a31b7d08480816d9c602b103985bb01