Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 00:54
Behavioral task
behavioral1
Sample
59d9d3426c38f1cff329800a24cc5430.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59d9d3426c38f1cff329800a24cc5430.exe
Resource
win10v2004-20231215-en
General
-
Target
59d9d3426c38f1cff329800a24cc5430.exe
-
Size
3.9MB
-
MD5
59d9d3426c38f1cff329800a24cc5430
-
SHA1
671254f127858e9c7ff714b4cb12f8c0b8e691a6
-
SHA256
deb12ee542e8ee85256f476c60031ce04b26d884481b9be3df4479128516df1f
-
SHA512
b6295a13ede87063e61fce071b288b85d469f81742ab5f70a85499503e5284b618c099dbdf1c0bb7b588e13af56eb1dafeffa55a85e5439c4ab939aa5e707960
-
SSDEEP
98304:R7kcUldE1UPbMcWEWzvgg3gnl/IVUt4pJWzZtIygg3gnl/IVUV:VkcUldBYjgl/iwgWttJgl/iG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 59d9d3426c38f1cff329800a24cc5430.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 59d9d3426c38f1cff329800a24cc5430.exe -
Loads dropped DLL 1 IoCs
pid Process 1588 59d9d3426c38f1cff329800a24cc5430.exe -
resource yara_rule behavioral1/memory/1588-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000900000001225c-10.dat upx behavioral1/files/0x000900000001225c-14.dat upx behavioral1/memory/3032-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1588 59d9d3426c38f1cff329800a24cc5430.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1588 59d9d3426c38f1cff329800a24cc5430.exe 3032 59d9d3426c38f1cff329800a24cc5430.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1588 wrote to memory of 3032 1588 59d9d3426c38f1cff329800a24cc5430.exe 28 PID 1588 wrote to memory of 3032 1588 59d9d3426c38f1cff329800a24cc5430.exe 28 PID 1588 wrote to memory of 3032 1588 59d9d3426c38f1cff329800a24cc5430.exe 28 PID 1588 wrote to memory of 3032 1588 59d9d3426c38f1cff329800a24cc5430.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d9d3426c38f1cff329800a24cc5430.exe"C:\Users\Admin\AppData\Local\Temp\59d9d3426c38f1cff329800a24cc5430.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\59d9d3426c38f1cff329800a24cc5430.exeC:\Users\Admin\AppData\Local\Temp\59d9d3426c38f1cff329800a24cc5430.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD58993d6d03b1cb10e7a2db3da51f7853d
SHA1fb7e23e9854965bcccb298ce8e4a68e2de4d18f1
SHA256779db18adc37f409674b8a065838e53442af85321c05f48cfbe50296fa3eb5bd
SHA5120de33e8072f5bd1abfa099babcecd10ee82d8ac92ca9bd69c98e25c01eb48001354e9bb7726d125f75f9bb493219c4184f7b7e2957678cc7e2ed5e0fe45b4b0a
-
Filesize
1.2MB
MD560413fcbff4e5c14ccc87e5f9039fd54
SHA1c48001899c9556aa7abf876fd4964e233c0aac73
SHA256bb1dcfe6a105444e3ac71dfb1c71598383a7a168a2afe4526aa64c104a5143fb
SHA51213fb3ab00d5f529db4770b1208a450e07f45d0aa6e084e7627bf0f55d11bd57d270aec88a91b1ed43b8fee1902dbf028c21772716af5a2a0aadf5ae4f196ad45