Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 22:29
Behavioral task
behavioral1
Sample
5992fff34f44e47ee4413130268dfc55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5992fff34f44e47ee4413130268dfc55.exe
Resource
win10v2004-20231215-en
General
-
Target
5992fff34f44e47ee4413130268dfc55.exe
-
Size
2.7MB
-
MD5
5992fff34f44e47ee4413130268dfc55
-
SHA1
db7f6c01aa17525c51e8da13685d395dc9e4c749
-
SHA256
ba67bb9687a9533d754358c7b7e59263282b2b7b539b66122e7ffbdfb02aa1a7
-
SHA512
1d3bfe7698c1f071260b4adad79feec4f38c8bd340af3445b29f1d9a0f764615b131f1351017b18deb936156e928edfffc7980626797b9d6c455314fb2d51bf4
-
SSDEEP
49152:ROjp0AzVwzipY5wqjlLFLnPXqVVPysErafwYO:ROF1VwzipgwqjjP0PysGCxO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 232 5992fff34f44e47ee4413130268dfc55.exe -
Executes dropped EXE 1 IoCs
pid Process 232 5992fff34f44e47ee4413130268dfc55.exe -
resource yara_rule behavioral2/memory/4756-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e982-13.dat upx behavioral2/memory/232-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4756 5992fff34f44e47ee4413130268dfc55.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4756 5992fff34f44e47ee4413130268dfc55.exe 232 5992fff34f44e47ee4413130268dfc55.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 232 4756 5992fff34f44e47ee4413130268dfc55.exe 24 PID 4756 wrote to memory of 232 4756 5992fff34f44e47ee4413130268dfc55.exe 24 PID 4756 wrote to memory of 232 4756 5992fff34f44e47ee4413130268dfc55.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe"C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exeC:\Users\Admin\AppData\Local\Temp\5992fff34f44e47ee4413130268dfc55.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5bbcf62d206292bc7f25d56aefd0ecf71
SHA1b4f95a17de3506ef16cfaedb297ae0a659a51f93
SHA25630b940e9e1fdbd603f14092317fde5d59f383bf38a64c185a5270567f9370d9e
SHA512f37ddf025c1f804e1659a3a883e90cd18abb5f980514222ff57ee0f0ab5b2834999b3dec6d0dd3f93b496efa6e394925069ac93f811e47fccba8e0d81520f2be