Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 16:32

General

  • Target

    65808808b47cd51e29391bb8b58d9516.exe

  • Size

    162KB

  • MD5

    65808808b47cd51e29391bb8b58d9516

  • SHA1

    7977c7f522be43d410035172b073380fb7b39b1a

  • SHA256

    c59802aebcaacf688dba0c8ade39f7ffffe7915405e2caa074499f9a5bbff23f

  • SHA512

    3cb0f84ba0ed50ba92044954b451c7b28ffc3de8e0d2656cabc78d67fca5932655d2339879b9cdcd6d4fc2f4515084bd6707583e31f8b93eb7ba01278d3b4d29

  • SSDEEP

    3072:WQP+aAywNocW3ULRajiegfo4Ndp+cDSUG210krWIMYYV9Z7jhxdktQK5WvYGEBhT:7+Dy3UNajEl+CSUWzV/79ziQK5WvYJB5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
    "C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
      C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\65808808b47cd51e29391bb8b58d9516.exe

    Filesize

    162KB

    MD5

    c99aedda189a8da54af4b45894733d03

    SHA1

    786f9b06a4668d2960a7f4e6ffd8beb498067d11

    SHA256

    63b0d4625bd24e8e4fca12490a42b368797f0f5c02010e3bb87f56042e353bf7

    SHA512

    425ce1c280c96d2c958e7cc0e00ccb3cd24f6170ab6dc02b4a81014eb132c05628dd5b6af2e474c8cf7a5b8bae39021a3c2912ed8aff39eee49f6cd1dda03334

  • memory/3196-13-0x00000000001C0000-0x00000000001EE000-memory.dmp

    Filesize

    184KB

  • memory/3196-25-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB

  • memory/3196-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3196-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3916-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3916-1-0x0000000001500000-0x000000000152E000-memory.dmp

    Filesize

    184KB

  • memory/3916-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3916-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB