Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 22:08
Behavioral task
behavioral1
Sample
66281139432d42f0ebc0619d768f40e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66281139432d42f0ebc0619d768f40e0.exe
Resource
win10v2004-20231215-en
General
-
Target
66281139432d42f0ebc0619d768f40e0.exe
-
Size
2.9MB
-
MD5
66281139432d42f0ebc0619d768f40e0
-
SHA1
46020d9ec426161ef31e10243e55e3f93c273782
-
SHA256
35b78933aba2c43894923fc9c4859ece4b14295fbde8191c6c4fc36da2743964
-
SHA512
e88e1c1b6f4a197d3229982ea2cee7792eb400de6c0341893bf75af68d4e322751ac3a443d154bdbdaf3d61a5bbfeec55a254ec4b139b8eea70eb0ed08787ee3
-
SSDEEP
49152:GAhPv7kEvZFmhDxBgyQWpb1luGP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:HhnAEvZFQDxjvdmGgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1680 66281139432d42f0ebc0619d768f40e0.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 66281139432d42f0ebc0619d768f40e0.exe -
resource yara_rule behavioral2/memory/3264-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0009000000023202-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3264 66281139432d42f0ebc0619d768f40e0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3264 66281139432d42f0ebc0619d768f40e0.exe 1680 66281139432d42f0ebc0619d768f40e0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3264 wrote to memory of 1680 3264 66281139432d42f0ebc0619d768f40e0.exe 35 PID 3264 wrote to memory of 1680 3264 66281139432d42f0ebc0619d768f40e0.exe 35 PID 3264 wrote to memory of 1680 3264 66281139432d42f0ebc0619d768f40e0.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\66281139432d42f0ebc0619d768f40e0.exe"C:\Users\Admin\AppData\Local\Temp\66281139432d42f0ebc0619d768f40e0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\66281139432d42f0ebc0619d768f40e0.exeC:\Users\Admin\AppData\Local\Temp\66281139432d42f0ebc0619d768f40e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD558473a84a83ff4f70582a71c5b94ea7a
SHA158e3bcd75cf60c72a3dae49e55d50cb3bca8365b
SHA256c3df2fc2c573ab956123ece14d49aeb40559df7e57eb76e5b57b6949b552faac
SHA5124a6c159b2e730161c0d76df6f1634ea16f814e13793b1af28d91241b7ed7122386e6c2e9627f5857300bef02e627de1dc526f78f67f33defe30096708ede0711