Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
575bfc8092b1b50d958c4a8468c44212.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
575bfc8092b1b50d958c4a8468c44212.exe
Resource
win10v2004-20231215-en
General
-
Target
575bfc8092b1b50d958c4a8468c44212.exe
-
Size
57KB
-
MD5
575bfc8092b1b50d958c4a8468c44212
-
SHA1
e7d2cef7e19f85999add3a3f652226b519104d54
-
SHA256
c8ea34762da02838fa90509c152e65ffa2dcfe66ba12d114f4f6b8049d4eb91a
-
SHA512
8dbfc2d0ce5d59b1af0babe54d0b3901fb82ece148ecc31978e6af76f4b3aa83b3f1257f1db5825186189b9d58ed77b7d15c107dec5d1f8351f33e44d50261f5
-
SSDEEP
1536:AfXYVM/xmn0mzxJGyPdvHpns0C2yRVaFEu2B6Y:AfVD2xJvPdfpHRyRcFev
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4588 575bfc8092b1b50d958c4a8468c44212.exe -
Executes dropped EXE 1 IoCs
pid Process 4588 575bfc8092b1b50d958c4a8468c44212.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3960 575bfc8092b1b50d958c4a8468c44212.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3960 575bfc8092b1b50d958c4a8468c44212.exe 4588 575bfc8092b1b50d958c4a8468c44212.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3960 wrote to memory of 4588 3960 575bfc8092b1b50d958c4a8468c44212.exe 91 PID 3960 wrote to memory of 4588 3960 575bfc8092b1b50d958c4a8468c44212.exe 91 PID 3960 wrote to memory of 4588 3960 575bfc8092b1b50d958c4a8468c44212.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\575bfc8092b1b50d958c4a8468c44212.exe"C:\Users\Admin\AppData\Local\Temp\575bfc8092b1b50d958c4a8468c44212.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\575bfc8092b1b50d958c4a8468c44212.exeC:\Users\Admin\AppData\Local\Temp\575bfc8092b1b50d958c4a8468c44212.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5ca86568d90bbf03f65883edacce9b2c2
SHA13de2fd71591330863f11ccdda4bad8afb6743afb
SHA256792c8bd874e3a0ed2ae2f0f84f6746fd966117de5eb90ae7364f96a99edd05bb
SHA5122b9edea01d7d96b2bf8545d530c5213910dcdd521a54673042ebec0c7f6c1366bd2333c853df87e39fd870c65dad8af240109af3119555f05677d25137843485