Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
63dcda7d9417a45699bd9fe570d2f14c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63dcda7d9417a45699bd9fe570d2f14c.exe
Resource
win10v2004-20231215-en
General
-
Target
63dcda7d9417a45699bd9fe570d2f14c.exe
-
Size
82KB
-
MD5
63dcda7d9417a45699bd9fe570d2f14c
-
SHA1
cf0eaa0a86b1cac45c94318aefbdba4bd1d8f0fe
-
SHA256
176797ddcb45d4a7231bcedd2a906f451dd494eea84dd8542ae768a476cfaad2
-
SHA512
09f04a0723551cac4ed79c6984003bd58494da8a3769c51ebe1abfcd5898e2f509c159066342323cab4e1be22f6991cb3e4a06de64d0d448f35223c5839bc958
-
SSDEEP
1536:5ZD5a7EzY0PMk1xmRxd+VEkhRDCmcsJxS5kt1KrjYI0X0Ur:5ZNawM0PLmRxi5hVZckxbtkcI0EUr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 63dcda7d9417a45699bd9fe570d2f14c.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 63dcda7d9417a45699bd9fe570d2f14c.exe -
Loads dropped DLL 1 IoCs
pid Process 2268 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2268 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2268 63dcda7d9417a45699bd9fe570d2f14c.exe 2692 63dcda7d9417a45699bd9fe570d2f14c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2692 2268 63dcda7d9417a45699bd9fe570d2f14c.exe 29 PID 2268 wrote to memory of 2692 2268 63dcda7d9417a45699bd9fe570d2f14c.exe 29 PID 2268 wrote to memory of 2692 2268 63dcda7d9417a45699bd9fe570d2f14c.exe 29 PID 2268 wrote to memory of 2692 2268 63dcda7d9417a45699bd9fe570d2f14c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe"C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exeC:\Users\Admin\AppData\Local\Temp\63dcda7d9417a45699bd9fe570d2f14c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5391bb3ea125dd9cc62ca39ea260cd763
SHA16f0abc721000f292036965cad96b3f3315e853ca
SHA256006d8a59a7757d276c2601a69e72123472d9a3beac43738f4e1104f75ec8e551
SHA512b9b16a9eca81c2d7497d5f41b72c598da4036752a010c6f9b8931ed5850df04e76426665f1b702ef0786b3cde77c4ec237f7c59a2ba2c85afeda159a057698ad