Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:36
Behavioral task
behavioral1
Sample
5c268b8c1956e841b8b8d6a1bc4dd73b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c268b8c1956e841b8b8d6a1bc4dd73b.exe
Resource
win10v2004-20231215-en
General
-
Target
5c268b8c1956e841b8b8d6a1bc4dd73b.exe
-
Size
2.7MB
-
MD5
5c268b8c1956e841b8b8d6a1bc4dd73b
-
SHA1
2eebe221e1c46aa96efe67773776ab4f18eecd33
-
SHA256
120cc30436dd16ce9013fe966d7f9da2025c2712c76aa641f0d2f2f001cda9f7
-
SHA512
d9c72c9cb2ba8373b725244a92f6a74a89acc83da933a9f2d91816e520333c4ffe94c2f9733ddad28242d28ce52762b1a30c5a835a26b0378ad766a69137547d
-
SSDEEP
49152:v2VipOA7m7eUUrt5K77EsA7GJ1XK3L1rjRp0sSiCxE/X:+VipOA7irUOMsLG5GpV2P
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4580 5c268b8c1956e841b8b8d6a1bc4dd73b.exe -
Executes dropped EXE 1 IoCs
pid Process 4580 5c268b8c1956e841b8b8d6a1bc4dd73b.exe -
resource yara_rule behavioral2/memory/1676-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023204-12.dat upx behavioral2/memory/4580-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1676 5c268b8c1956e841b8b8d6a1bc4dd73b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1676 5c268b8c1956e841b8b8d6a1bc4dd73b.exe 4580 5c268b8c1956e841b8b8d6a1bc4dd73b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4580 1676 5c268b8c1956e841b8b8d6a1bc4dd73b.exe 85 PID 1676 wrote to memory of 4580 1676 5c268b8c1956e841b8b8d6a1bc4dd73b.exe 85 PID 1676 wrote to memory of 4580 1676 5c268b8c1956e841b8b8d6a1bc4dd73b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c268b8c1956e841b8b8d6a1bc4dd73b.exe"C:\Users\Admin\AppData\Local\Temp\5c268b8c1956e841b8b8d6a1bc4dd73b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\5c268b8c1956e841b8b8d6a1bc4dd73b.exeC:\Users\Admin\AppData\Local\Temp\5c268b8c1956e841b8b8d6a1bc4dd73b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d3745805c2a4db3cc68e90a86ff6477f
SHA1b696328518955fe51b43ae797e2bf443895be7d5
SHA256854934f8baf92ebba47ab518fa471bde9608c6e01beb71d8688d9cfcd80d33f2
SHA5123fd80f6d141514e18b193601de4775c0abae24c94cf620a859f24f2617fbbcd91eef466544ba1e30e3185ac82a59969a116b39068125e76c331169ab7e9b8e19