Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 08:42
Behavioral task
behavioral1
Sample
64f72f0f6278e9d2e2a078ea781ba82c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
64f72f0f6278e9d2e2a078ea781ba82c.exe
Resource
win10v2004-20231222-en
General
-
Target
64f72f0f6278e9d2e2a078ea781ba82c.exe
-
Size
2.9MB
-
MD5
64f72f0f6278e9d2e2a078ea781ba82c
-
SHA1
e763228ac1bc2199176d5310d938fd98769b4e2f
-
SHA256
57c4888b51d6de8b448e650d03cbe60532995e15aa3f7c0799402edd2d4e4a74
-
SHA512
ff5781fa42e315b5b78a2322c42323d6ce36b604c138a9539c20f7b5de691fa10e472ede8f004e15918ec057496d70b4b61c73dad65a3c6d90e4d9133378d93d
-
SSDEEP
49152:Cv6mSmuO9PycHf3/WfR6H8hjxYsLNeC6DMleP4M338dB2IBlGuuDVUsdxxjeQZw2:Cv/9P1+f8HmlZNR6DMlegg3gnl/IVUsn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 64f72f0f6278e9d2e2a078ea781ba82c.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 64f72f0f6278e9d2e2a078ea781ba82c.exe -
resource yara_rule behavioral2/memory/2776-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023237-11.dat upx behavioral2/memory/4900-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2776 64f72f0f6278e9d2e2a078ea781ba82c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2212 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2776 64f72f0f6278e9d2e2a078ea781ba82c.exe 4900 64f72f0f6278e9d2e2a078ea781ba82c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 4900 2776 64f72f0f6278e9d2e2a078ea781ba82c.exe 89 PID 2776 wrote to memory of 4900 2776 64f72f0f6278e9d2e2a078ea781ba82c.exe 89 PID 2776 wrote to memory of 4900 2776 64f72f0f6278e9d2e2a078ea781ba82c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f72f0f6278e9d2e2a078ea781ba82c.exe"C:\Users\Admin\AppData\Local\Temp\64f72f0f6278e9d2e2a078ea781ba82c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\64f72f0f6278e9d2e2a078ea781ba82c.exeC:\Users\Admin\AppData\Local\Temp\64f72f0f6278e9d2e2a078ea781ba82c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ac44ab3cd03597937c618857fca914f1
SHA1cdf079ff5fad701021ed743f67c9cf9ac7d99730
SHA256530653a1f70b910029667d88a1aab07f5793bd114a25d635b2e51c9bb1b9481b
SHA512fc0ba57f96ac1aee526e244021acc5b3289e2ddcc1c69d6eae9c18de88fbb5c719e6b6e60e3d65705d8a60eb455746dc4a2c516df9d04f590300d0a668fc8683