Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
6390f6fa0decd33ed30078e52653d721.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6390f6fa0decd33ed30078e52653d721.exe
Resource
win10v2004-20231215-en
General
-
Target
6390f6fa0decd33ed30078e52653d721.exe
-
Size
82KB
-
MD5
6390f6fa0decd33ed30078e52653d721
-
SHA1
925c7ea345b45daa897b95b91d0ba2d270e882af
-
SHA256
5831852dbc5b6daf310ba2ea8de53cac89df3f7e197f082d45878cfb9a4dc79a
-
SHA512
ef2ade9104df8ca6c7663156c23f9a8430eb3b17aa429ca774c08a7a922d2b91d1a129524a49c559d22970169f8643514f0a042b1d5944e3a9dcbea92271581f
-
SSDEEP
1536:OSL6zwxoXc6Y0xdrDqscL4tG4c9g3pmra7XGQ+B/uX8:swSLx1MNaceaL/uX8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 6390f6fa0decd33ed30078e52653d721.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 6390f6fa0decd33ed30078e52653d721.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 6390f6fa0decd33ed30078e52653d721.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2992 6390f6fa0decd33ed30078e52653d721.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2992 6390f6fa0decd33ed30078e52653d721.exe 2788 6390f6fa0decd33ed30078e52653d721.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2788 2992 6390f6fa0decd33ed30078e52653d721.exe 29 PID 2992 wrote to memory of 2788 2992 6390f6fa0decd33ed30078e52653d721.exe 29 PID 2992 wrote to memory of 2788 2992 6390f6fa0decd33ed30078e52653d721.exe 29 PID 2992 wrote to memory of 2788 2992 6390f6fa0decd33ed30078e52653d721.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6390f6fa0decd33ed30078e52653d721.exe"C:\Users\Admin\AppData\Local\Temp\6390f6fa0decd33ed30078e52653d721.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\6390f6fa0decd33ed30078e52653d721.exeC:\Users\Admin\AppData\Local\Temp\6390f6fa0decd33ed30078e52653d721.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55526eec74c4b19313b4b0d2fff9485de
SHA19f3a995c84dd9b2893f5402fc55cbe9b4d890398
SHA256cd42aa4feb9411f7471c0467715edde62575de3e348d492cadcd0a542b923592
SHA512a2d4b79d2a4eb0c3f8e5ef0f714334a27a0bb5d1b2292db55820dc8c54a09d1dc3da445bf85f1771b3a7f33ad0335b1088f98e8c73423176f2120312f03e369a