Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
5a3543c716e52d337c7d13548538ab5a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a3543c716e52d337c7d13548538ab5a.exe
Resource
win10v2004-20231222-en
General
-
Target
5a3543c716e52d337c7d13548538ab5a.exe
-
Size
82KB
-
MD5
5a3543c716e52d337c7d13548538ab5a
-
SHA1
ef257c2665654d5c9ee7e4c4ac8d154531b5a662
-
SHA256
7f1ec8450dcb18cb7bff35ed56140f7556d2557b9fbf59ba42b6b45dee339f23
-
SHA512
4f4bee9a41e2de4ec3c85479fc53ef1d4c7d42fb8140b9f1c9e56dc1cb379977db5a8237acdf7604bf8d7395fc16921c2352097e7d82e750498440a3f3ab47d0
-
SSDEEP
1536:xwLGqVR/RHn6YDoFZ4PR6CGSnv9yHsV6UDqKefi5:xRwpRHn6FFZ4PR/cHsV9DVoi5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4576 5a3543c716e52d337c7d13548538ab5a.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 5a3543c716e52d337c7d13548538ab5a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1508 5a3543c716e52d337c7d13548538ab5a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1508 5a3543c716e52d337c7d13548538ab5a.exe 4576 5a3543c716e52d337c7d13548538ab5a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4576 1508 5a3543c716e52d337c7d13548538ab5a.exe 89 PID 1508 wrote to memory of 4576 1508 5a3543c716e52d337c7d13548538ab5a.exe 89 PID 1508 wrote to memory of 4576 1508 5a3543c716e52d337c7d13548538ab5a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a3543c716e52d337c7d13548538ab5a.exe"C:\Users\Admin\AppData\Local\Temp\5a3543c716e52d337c7d13548538ab5a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\5a3543c716e52d337c7d13548538ab5a.exeC:\Users\Admin\AppData\Local\Temp\5a3543c716e52d337c7d13548538ab5a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD51baafc20a8c4154dbef5ea5385ede338
SHA1c876b3e7fee531ccad61d6e8389ce76dbbbe3c6a
SHA256775ec38b1daaf969050fe4a03d072ac893ed5d99445bf3cdb1e4748b72b96e08
SHA512247ace9eefea5f8104a257f753ca1081dd13de9e305c7528471342ae92ccc8699b8aa4657f72a0a02eae5c15f3fc630eae9dfa95b9ddaeace6d22ecd823212d7