Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 08:24
Behavioral task
behavioral1
Sample
58729542e6872d7dddd86dc4bd5ffe62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58729542e6872d7dddd86dc4bd5ffe62.exe
Resource
win10v2004-20231222-en
General
-
Target
58729542e6872d7dddd86dc4bd5ffe62.exe
-
Size
1.3MB
-
MD5
58729542e6872d7dddd86dc4bd5ffe62
-
SHA1
424260fef16064bcf449c5509b73e6bca1f822af
-
SHA256
47bc7d7d6883bc00b3a034e14da9f07121269fec95f950c1c49a801093ca8fea
-
SHA512
87d988a64f6878341e1782c68fd8ac0ecd810bd73fe3ec7d7075eb00d6dcbd62bc6a0a34807fa39ad935caf91fdf6269e76bc2c8c9b0d2c5fbb2580904063bbc
-
SSDEEP
24576:kp5Ow6MyjPfNmdx62V3e8kg11djqq8s+zrTkF/23YwWZ4AnleACvG:Zw6jPAdY2VOelVsrTkF/IW6AnUA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 58729542e6872d7dddd86dc4bd5ffe62.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 58729542e6872d7dddd86dc4bd5ffe62.exe -
resource yara_rule behavioral2/memory/3364-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00080000000231ff-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3364 58729542e6872d7dddd86dc4bd5ffe62.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3364 58729542e6872d7dddd86dc4bd5ffe62.exe 2788 58729542e6872d7dddd86dc4bd5ffe62.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2788 3364 58729542e6872d7dddd86dc4bd5ffe62.exe 16 PID 3364 wrote to memory of 2788 3364 58729542e6872d7dddd86dc4bd5ffe62.exe 16 PID 3364 wrote to memory of 2788 3364 58729542e6872d7dddd86dc4bd5ffe62.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe"C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exeC:\Users\Admin\AppData\Local\Temp\58729542e6872d7dddd86dc4bd5ffe62.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5fca1083e239058bccf29450888095b68
SHA18061cac43242405fb0f565f65d30b5f2228baa00
SHA25666f8a43b672a209684ef7a12f0fcaf2c63c1cd3b9451af47853b133e51a0774a
SHA512fc0d4b12669b07299e10e2de9f91e2fd6d400ff96d64d7ab8321632e0ea6f2b1680e98aa07ca28c76ed89e0638c2304cc6b9c777ff9ffa2ab7fc65b93471251c