Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
60f12649cc4946cc9974bc35073ed7d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60f12649cc4946cc9974bc35073ed7d7.exe
Resource
win10v2004-20231222-en
General
-
Target
60f12649cc4946cc9974bc35073ed7d7.exe
-
Size
92KB
-
MD5
60f12649cc4946cc9974bc35073ed7d7
-
SHA1
16626c1d4fabc908b37e9a4d5d1cfaea66710296
-
SHA256
bd269da790f24dd1df7d236179eab223f1e38cc31aaa249d28f6a626c4f2a8d2
-
SHA512
55bf818412790f241050cb217f58ee907713861a60c8bd12bccaa16a45ecfb3e02310e871c085df384075bddb53e860f220761c2bd5b9afc9accef34c86841e2
-
SSDEEP
1536:/1K4EiJ540PZjgabwj2jHzS+jSt5j8vhxdjNJXGKDSEkzOraIZdjsa:dpd40Oas2j+1tl+jZ7nSEaSZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 60f12649cc4946cc9974bc35073ed7d7.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4524 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4524 60f12649cc4946cc9974bc35073ed7d7.exe 3032 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3032 4524 60f12649cc4946cc9974bc35073ed7d7.exe 89 PID 4524 wrote to memory of 3032 4524 60f12649cc4946cc9974bc35073ed7d7.exe 89 PID 4524 wrote to memory of 3032 4524 60f12649cc4946cc9974bc35073ed7d7.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe"C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exeC:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD500470b60af976daa60953a94fbe9f1c5
SHA1711a7553c4ff400f7468d0f6bea62c4f94f779db
SHA25688c2d38cf9a93db89e915bbf5dcefea180ea1ef4bdd103abc3adce4064f72786
SHA5129ec8b7c91cc97e4538de3ea676a217774b91f1ba7c5fdaebba6079e0f6f2958f89d4ec6b446ba38bc344aa6e24bf4eef2599bb98bed1a9e8b3c80f08d16e7536