Analysis
-
max time kernel
98s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:32
Behavioral task
behavioral1
Sample
5c24bb8de15368a5ec25ff0cdeb9ef6c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c24bb8de15368a5ec25ff0cdeb9ef6c.exe
Resource
win10v2004-20231215-en
General
-
Target
5c24bb8de15368a5ec25ff0cdeb9ef6c.exe
-
Size
5.8MB
-
MD5
5c24bb8de15368a5ec25ff0cdeb9ef6c
-
SHA1
70d63cfcb0e9bdf939862f41daa1de62685520aa
-
SHA256
07991253f16a6cedd78f9a76c0a508f8ec1cfb0a294f143dc998061530c2c24a
-
SHA512
d1d51eb17b6837fa00e051b69fdc9566ffb0689762643abe4787eef6a9c2f1d42482d2449ad1c85c1c5d2d7d15fd72e74a1255e68aa9d5691e3fa6d74d602291
-
SSDEEP
98304:vXYZPRkaJPHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:vIZPRkaJ/auq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3196 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe -
Executes dropped EXE 1 IoCs
pid Process 3196 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe -
resource yara_rule behavioral2/memory/1016-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0009000000023214-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1016 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1016 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe 3196 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3196 1016 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe 22 PID 1016 wrote to memory of 3196 1016 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe 22 PID 1016 wrote to memory of 3196 1016 5c24bb8de15368a5ec25ff0cdeb9ef6c.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c24bb8de15368a5ec25ff0cdeb9ef6c.exe"C:\Users\Admin\AppData\Local\Temp\5c24bb8de15368a5ec25ff0cdeb9ef6c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\5c24bb8de15368a5ec25ff0cdeb9ef6c.exeC:\Users\Admin\AppData\Local\Temp\5c24bb8de15368a5ec25ff0cdeb9ef6c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f18c5a946d702218ca60d0f7fe868b7a
SHA1f3bee61c9de19f0fb09a24a4cd7213240b537498
SHA2562b935ea6a162464778cfcf3213c82b7d8d18550aa9dc6e313c59ef30df1e0e10
SHA512f4c7009d058c7ff9a9081460d171091dada106a1d13527785a8019a7e7ae8ce9e9236ea3ec397e7421a1371e70f151d9d2ae771d53648730993bdc4d55cd56c0