Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 00:45
Behavioral task
behavioral1
Sample
5baf6cc00735a3071bffc5f92bc348e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5baf6cc00735a3071bffc5f92bc348e7.exe
Resource
win10v2004-20231215-en
General
-
Target
5baf6cc00735a3071bffc5f92bc348e7.exe
-
Size
1.3MB
-
MD5
5baf6cc00735a3071bffc5f92bc348e7
-
SHA1
49d72a7f93e68d4be6b7519185aa046e969c4b52
-
SHA256
14adb89a541aea2a37b23acbf1bb0f7be100974b437f0026e312767d68e0c949
-
SHA512
15a7afb2a472cba22bfc297782a3c97e929e47095f5d69ff7b860c6ab453375925df93c898669bc87aa0f4d2018e6f3203e46271b4c1f32c1898a30006eff1ad
-
SSDEEP
24576:207++j9xY2+h3k8ANhatHrt8W0vYTmr7ZOFKF7D58CqVocxIGfWc:l7NTRm3HWgq1YTI9tYIGfp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1816 5baf6cc00735a3071bffc5f92bc348e7.exe -
Executes dropped EXE 1 IoCs
pid Process 1816 5baf6cc00735a3071bffc5f92bc348e7.exe -
resource yara_rule behavioral2/memory/1184-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023218-11.dat upx behavioral2/memory/1816-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1184 5baf6cc00735a3071bffc5f92bc348e7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1184 5baf6cc00735a3071bffc5f92bc348e7.exe 1816 5baf6cc00735a3071bffc5f92bc348e7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1816 1184 5baf6cc00735a3071bffc5f92bc348e7.exe 85 PID 1184 wrote to memory of 1816 1184 5baf6cc00735a3071bffc5f92bc348e7.exe 85 PID 1184 wrote to memory of 1816 1184 5baf6cc00735a3071bffc5f92bc348e7.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5baf6cc00735a3071bffc5f92bc348e7.exe"C:\Users\Admin\AppData\Local\Temp\5baf6cc00735a3071bffc5f92bc348e7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\5baf6cc00735a3071bffc5f92bc348e7.exeC:\Users\Admin\AppData\Local\Temp\5baf6cc00735a3071bffc5f92bc348e7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
927KB
MD5b59ab949a0c8a145f1c2fc610a66fc4f
SHA18b2855f40f0c332e687d629f4a818186e4e84c59
SHA2568bf7e3cc77da274c03aa6837c2c27726d90f16f92f98c4ad7952d9de7f6b772d
SHA5123bc2eddcaaf0d1a4d913dff42f5a867687be6938f83e5b1faad8245b46019acb24229404954015d29d1d691582eab19a0dd91d53e50f46c7df63a10f61524e47