Analysis
-
max time kernel
136s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 21:43
Behavioral task
behavioral1
Sample
661b549ede80d87f2211e07644c786e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
661b549ede80d87f2211e07644c786e3.exe
Resource
win10v2004-20231215-en
General
-
Target
661b549ede80d87f2211e07644c786e3.exe
-
Size
1.3MB
-
MD5
661b549ede80d87f2211e07644c786e3
-
SHA1
1ebc6390ac9f9ef66f21fab5418bbcf6617877fb
-
SHA256
6394268b19c9a82f7f3ed26fdfd560b4608e8c2a49d580b4fafa788904423b7a
-
SHA512
aeccb8c0e231d590786cc02530c7d7f0a14c313fbc93cc185e297e01d91dad3b9caafed8f4fa6ecb304e2bccd6e75d890380efaff680c2dd64b85ea7f3b90acd
-
SSDEEP
24576:15RMr5IqFXb8lY0zjSxfS40my3/2xil3jjV4PJHIczvG:15UbdbDgG9l0my+xilThwBI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1868 661b549ede80d87f2211e07644c786e3.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 661b549ede80d87f2211e07644c786e3.exe -
resource yara_rule behavioral2/memory/3296-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000e00000001e2b4-12.dat upx behavioral2/memory/1868-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3296 661b549ede80d87f2211e07644c786e3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3296 661b549ede80d87f2211e07644c786e3.exe 1868 661b549ede80d87f2211e07644c786e3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3296 wrote to memory of 1868 3296 661b549ede80d87f2211e07644c786e3.exe 89 PID 3296 wrote to memory of 1868 3296 661b549ede80d87f2211e07644c786e3.exe 89 PID 3296 wrote to memory of 1868 3296 661b549ede80d87f2211e07644c786e3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\661b549ede80d87f2211e07644c786e3.exe"C:\Users\Admin\AppData\Local\Temp\661b549ede80d87f2211e07644c786e3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\661b549ede80d87f2211e07644c786e3.exeC:\Users\Admin\AppData\Local\Temp\661b549ede80d87f2211e07644c786e3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f48e39803f5aebc696d066b2afb8706a
SHA1d5aa372a0e9760e9ec9918f4b2effa3e13be4a22
SHA2562e300d2c984b195baf68ffd29b7db2ec641c16504b7fdc24adf944e1328356cc
SHA512b89e1b27291504bfe4d7f1e905b1d542bd2235b36a7311f42a695b6053b2ab00a42393ade0dd2e01ecaded86a3b1277938b2bbdc3331160dbb23aa534e8dede9