Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 08:24
Behavioral task
behavioral1
Sample
58729542e6872d7dddd86dc4bd5ffe62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58729542e6872d7dddd86dc4bd5ffe62.exe
Resource
win10v2004-20231222-en
General
-
Target
58729542e6872d7dddd86dc4bd5ffe62.exe
-
Size
1.3MB
-
MD5
58729542e6872d7dddd86dc4bd5ffe62
-
SHA1
424260fef16064bcf449c5509b73e6bca1f822af
-
SHA256
47bc7d7d6883bc00b3a034e14da9f07121269fec95f950c1c49a801093ca8fea
-
SHA512
87d988a64f6878341e1782c68fd8ac0ecd810bd73fe3ec7d7075eb00d6dcbd62bc6a0a34807fa39ad935caf91fdf6269e76bc2c8c9b0d2c5fbb2580904063bbc
-
SSDEEP
24576:kp5Ow6MyjPfNmdx62V3e8kg11djqq8s+zrTkF/23YwWZ4AnleACvG:Zw6jPAdY2VOelVsrTkF/IW6AnUA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1736 58729542e6872d7dddd86dc4bd5ffe62.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 58729542e6872d7dddd86dc4bd5ffe62.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 58729542e6872d7dddd86dc4bd5ffe62.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c000000012262-11.dat upx behavioral1/memory/2392-16-0x0000000003560000-0x00000000039CA000-memory.dmp upx behavioral1/files/0x000c000000012262-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 58729542e6872d7dddd86dc4bd5ffe62.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2392 58729542e6872d7dddd86dc4bd5ffe62.exe 1736 58729542e6872d7dddd86dc4bd5ffe62.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1736 2392 58729542e6872d7dddd86dc4bd5ffe62.exe 28 PID 2392 wrote to memory of 1736 2392 58729542e6872d7dddd86dc4bd5ffe62.exe 28 PID 2392 wrote to memory of 1736 2392 58729542e6872d7dddd86dc4bd5ffe62.exe 28 PID 2392 wrote to memory of 1736 2392 58729542e6872d7dddd86dc4bd5ffe62.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe"C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exeC:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD588243e1bc285b52526261b32752364a4
SHA18be3c64d54da5afc58d783074931d4d78a929b7f
SHA2565979d2c8c35a38cfaf9069051d1184e24a83812bc2c4e442575210c376dcb37f
SHA512cbdf88a3871468d8e56a2d91ecd11bf0881b0bd7d2a336c447af8428f7d0cc5856c31f7a4107cdb531dea430c3e7883e66beff8fb5acb6791a305eb0c9d30ea0
-
Filesize
763KB
MD56abf20fb8537f5a5cc6487a295ae3fec
SHA13dbae23e8a036c066ede1aa0d0000e9fb7f47e3e
SHA256292b500fe271ff498dab9741a7220a14d74f86a085b0536be24f5c1c42180eb6
SHA512b174e84f20db27c5b375c20b3b50a0f561e922baa818167e6b5d9667feae09aa5e335b1e77ba593749138ac1d527d2d44feb057ee0fb6edc6a65b735aa925ca3