Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
65808808b47cd51e29391bb8b58d9516.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65808808b47cd51e29391bb8b58d9516.exe
Resource
win10v2004-20231222-en
General
-
Target
65808808b47cd51e29391bb8b58d9516.exe
-
Size
162KB
-
MD5
65808808b47cd51e29391bb8b58d9516
-
SHA1
7977c7f522be43d410035172b073380fb7b39b1a
-
SHA256
c59802aebcaacf688dba0c8ade39f7ffffe7915405e2caa074499f9a5bbff23f
-
SHA512
3cb0f84ba0ed50ba92044954b451c7b28ffc3de8e0d2656cabc78d67fca5932655d2339879b9cdcd6d4fc2f4515084bd6707583e31f8b93eb7ba01278d3b4d29
-
SSDEEP
3072:WQP+aAywNocW3ULRajiegfo4Ndp+cDSUG210krWIMYYV9Z7jhxdktQK5WvYGEBhT:7+Dy3UNajEl+CSUWzV/79ziQK5WvYJB5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3196 65808808b47cd51e29391bb8b58d9516.exe -
Executes dropped EXE 1 IoCs
pid Process 3196 65808808b47cd51e29391bb8b58d9516.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3916 65808808b47cd51e29391bb8b58d9516.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3916 65808808b47cd51e29391bb8b58d9516.exe 3196 65808808b47cd51e29391bb8b58d9516.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3196 3916 65808808b47cd51e29391bb8b58d9516.exe 26 PID 3916 wrote to memory of 3196 3916 65808808b47cd51e29391bb8b58d9516.exe 26 PID 3916 wrote to memory of 3196 3916 65808808b47cd51e29391bb8b58d9516.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe"C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exeC:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5c99aedda189a8da54af4b45894733d03
SHA1786f9b06a4668d2960a7f4e6ffd8beb498067d11
SHA25663b0d4625bd24e8e4fca12490a42b368797f0f5c02010e3bb87f56042e353bf7
SHA512425ce1c280c96d2c958e7cc0e00ccb3cd24f6170ab6dc02b4a81014eb132c05628dd5b6af2e474c8cf7a5b8bae39021a3c2912ed8aff39eee49f6cd1dda03334