Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 23:50
Behavioral task
behavioral1
Sample
59baf5c49316b92306fddbf83cf0c892.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59baf5c49316b92306fddbf83cf0c892.exe
Resource
win10v2004-20231215-en
General
-
Target
59baf5c49316b92306fddbf83cf0c892.exe
-
Size
56KB
-
MD5
59baf5c49316b92306fddbf83cf0c892
-
SHA1
f319e28d3e282a3a2c327ae1802f58df1a55f272
-
SHA256
7e2426a73de5d2ebd20aa3048012b1991effbfc1237ae2ef5a3d903996ac2f02
-
SHA512
2ff673bc51b72c6d2cd166d302bcd34bc3436011574c34039eabcdbc2a003e44de6267a7e92946c4b5a1267356c140f383b3e1e76073ca8fdf507d2e13f3f2a8
-
SSDEEP
1536:Lj2G3F47ZfeXBgnEASnUfu9wio/JooZL:Lu9eX9csob1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 59baf5c49316b92306fddbf83cf0c892.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 59baf5c49316b92306fddbf83cf0c892.exe -
resource yara_rule behavioral2/memory/1480-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000c000000023165-11.dat upx behavioral2/memory/3000-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1480 59baf5c49316b92306fddbf83cf0c892.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1480 59baf5c49316b92306fddbf83cf0c892.exe 3000 59baf5c49316b92306fddbf83cf0c892.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3000 1480 59baf5c49316b92306fddbf83cf0c892.exe 88 PID 1480 wrote to memory of 3000 1480 59baf5c49316b92306fddbf83cf0c892.exe 88 PID 1480 wrote to memory of 3000 1480 59baf5c49316b92306fddbf83cf0c892.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\59baf5c49316b92306fddbf83cf0c892.exe"C:\Users\Admin\AppData\Local\Temp\59baf5c49316b92306fddbf83cf0c892.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\59baf5c49316b92306fddbf83cf0c892.exeC:\Users\Admin\AppData\Local\Temp\59baf5c49316b92306fddbf83cf0c892.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5a2a4dfd83675cfbd1c89419deed99749
SHA1ad98035f84c62117ba1eda02a1cf4d2bd78a11f7
SHA2560bef91778ed63ef3b39e5feab84d8834ace40154fd0188b23dd72b04b5eddec0
SHA5124b5e1a99e365f3253bb336ad19ee17842afbbbeb58b46b3a92e89ec78e83b25be158c1739dc382a9f95f72a1b353ca26815de04ee13834742e4e7299fbe67590