Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
59c386aa31edf2eba060cf4f69a090b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59c386aa31edf2eba060cf4f69a090b1.exe
Resource
win10v2004-20231215-en
General
-
Target
59c386aa31edf2eba060cf4f69a090b1.exe
-
Size
82KB
-
MD5
59c386aa31edf2eba060cf4f69a090b1
-
SHA1
0aea8cedff94cb2270fef323cd295fa0f1f28b5e
-
SHA256
00c40a9546518e6db9c8e9dbb87b7105cdff8d84ebb7bff9b2072d1b7d75bbc0
-
SHA512
8955c4c536f136fe5460c7cd4219aecaf591135752d588dbc11cac70fded1153df8f570cdf19469438f7ee70077b3d3a4d3e856eb3703b20110fc75e5ce1228a
-
SSDEEP
1536:RXG2iQnLID1vWk7o/XbvL16NpedaMXY0a7tJfywqY2BVRp:RW2itOB/XANsduJVs/f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2288 59c386aa31edf2eba060cf4f69a090b1.exe -
Executes dropped EXE 1 IoCs
pid Process 2288 59c386aa31edf2eba060cf4f69a090b1.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 59c386aa31edf2eba060cf4f69a090b1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 59c386aa31edf2eba060cf4f69a090b1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2256 59c386aa31edf2eba060cf4f69a090b1.exe 2288 59c386aa31edf2eba060cf4f69a090b1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2288 2256 59c386aa31edf2eba060cf4f69a090b1.exe 29 PID 2256 wrote to memory of 2288 2256 59c386aa31edf2eba060cf4f69a090b1.exe 29 PID 2256 wrote to memory of 2288 2256 59c386aa31edf2eba060cf4f69a090b1.exe 29 PID 2256 wrote to memory of 2288 2256 59c386aa31edf2eba060cf4f69a090b1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c386aa31edf2eba060cf4f69a090b1.exe"C:\Users\Admin\AppData\Local\Temp\59c386aa31edf2eba060cf4f69a090b1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\59c386aa31edf2eba060cf4f69a090b1.exeC:\Users\Admin\AppData\Local\Temp\59c386aa31edf2eba060cf4f69a090b1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2288
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56324054c9d3c1050790b77914dd24a00
SHA160fb320662ad5e247e004c0f881c02e8db7b34dd
SHA2563e295ee846d9371ebda078c60aae7adc615fc527c087c6e8e70ec6a25e73024a
SHA51282e9fe65a0a6480fcd5393d0868d055dd7e96bf89cf133879dfd67a8bc8e58296c0cf543847786d8e1a131a5f5dab2d4a0ca4823d1a6c67d1bc5946f15ea0153