Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 11:01
Behavioral task
behavioral1
Sample
5b1170fd534bb85ae72a7e36675ca94e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b1170fd534bb85ae72a7e36675ca94e.exe
Resource
win10v2004-20231215-en
General
-
Target
5b1170fd534bb85ae72a7e36675ca94e.exe
-
Size
5.8MB
-
MD5
5b1170fd534bb85ae72a7e36675ca94e
-
SHA1
faf8984114d756d40c0eabd3affd46a78e5dfe29
-
SHA256
fb41d97640d9221ff05bc607a06914a8a0a23fff900379913ddbf47de5363b01
-
SHA512
a42cdee98a7f0564a14077ce5daa7d550326f12558069b82b7d4de7fd20a43762d5495ebd12766d33af49a0f91f70bb294e56c7f56d84b03c66d1f4ee7571581
-
SSDEEP
98304:g2vTn7BUb2mN64HBUCczzM30z9GZJ0sWzV8Pe4HBUCczzM3:gCfoZWCKg+jVOWC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 5b1170fd534bb85ae72a7e36675ca94e.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 5b1170fd534bb85ae72a7e36675ca94e.exe -
resource yara_rule behavioral2/memory/1928-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0006000000023227-11.dat upx behavioral2/memory/1956-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1928 5b1170fd534bb85ae72a7e36675ca94e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1928 5b1170fd534bb85ae72a7e36675ca94e.exe 1956 5b1170fd534bb85ae72a7e36675ca94e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1956 1928 5b1170fd534bb85ae72a7e36675ca94e.exe 67 PID 1928 wrote to memory of 1956 1928 5b1170fd534bb85ae72a7e36675ca94e.exe 67 PID 1928 wrote to memory of 1956 1928 5b1170fd534bb85ae72a7e36675ca94e.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b1170fd534bb85ae72a7e36675ca94e.exe"C:\Users\Admin\AppData\Local\Temp\5b1170fd534bb85ae72a7e36675ca94e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\5b1170fd534bb85ae72a7e36675ca94e.exeC:\Users\Admin\AppData\Local\Temp\5b1170fd534bb85ae72a7e36675ca94e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5eae283157f4359572ceef322a7bdc714
SHA1815894b4a34557c91a41435d6837d76e82dde8dd
SHA256363e3e3f971cff3dfbbcda75d27eeee7a71d5b52d4b0987a556dfbd15c1d724f
SHA512d3e606605518ee675a620b8a2805b147bd66d8ca0e8ae9f9897f3edc4b5ab6cf5af518dac257e54025a8fbbbea990bb0bcc4c27e3f93e282a11dfe644e42cbd1