Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 05:27
Behavioral task
behavioral1
Sample
5818e3a117f67d417e0ad960a54f81fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5818e3a117f67d417e0ad960a54f81fe.exe
Resource
win10v2004-20231222-en
General
-
Target
5818e3a117f67d417e0ad960a54f81fe.exe
-
Size
5.8MB
-
MD5
5818e3a117f67d417e0ad960a54f81fe
-
SHA1
a27529a097502a91e08f9ce9960d2b7c3e5d10e0
-
SHA256
4060dff940876d5960d82b6afbb894b4069f899831d387b5d7a8eea110953073
-
SHA512
abcfcbffef2b69dc4f2a932fe627466864c23c795f53a71486d64d09e56388cb8902a3d8a7d7b98049e657a44e5f7db05a791d7f3233aeae3a2784072156c264
-
SSDEEP
98304:mx7MTvpoqjlk+jeGvHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwv:mx7MTvpoqa+5auq1jI86FA7y2auq1jIH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3816 5818e3a117f67d417e0ad960a54f81fe.exe -
Executes dropped EXE 1 IoCs
pid Process 3816 5818e3a117f67d417e0ad960a54f81fe.exe -
resource yara_rule behavioral2/memory/3696-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023204-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3696 5818e3a117f67d417e0ad960a54f81fe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3696 5818e3a117f67d417e0ad960a54f81fe.exe 3816 5818e3a117f67d417e0ad960a54f81fe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3816 3696 5818e3a117f67d417e0ad960a54f81fe.exe 88 PID 3696 wrote to memory of 3816 3696 5818e3a117f67d417e0ad960a54f81fe.exe 88 PID 3696 wrote to memory of 3816 3696 5818e3a117f67d417e0ad960a54f81fe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5818e3a117f67d417e0ad960a54f81fe.exe"C:\Users\Admin\AppData\Local\Temp\5818e3a117f67d417e0ad960a54f81fe.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\5818e3a117f67d417e0ad960a54f81fe.exeC:\Users\Admin\AppData\Local\Temp\5818e3a117f67d417e0ad960a54f81fe.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5761a226f0b25b87789f8f693437868d1
SHA11c0c05f420ef33bbff8255a00e2071a2c0d3be35
SHA2566058f73f36b209ae31b7087643a0ef4bf2b78f21ccd0bea62d840cdc48fa40d8
SHA5123c6445ec473fc6dc0eeea5e5af30fb295fba6b4242c85acef973ba3f9becfab11995bae1c4839f14d517eab3d24d85f5c55001db1f1847c8b4c16a1e750cce23