Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 16:11
Behavioral task
behavioral1
Sample
6576cd124f9e5d320e6567e2702b9d8d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6576cd124f9e5d320e6567e2702b9d8d.exe
Resource
win10v2004-20231222-en
General
-
Target
6576cd124f9e5d320e6567e2702b9d8d.exe
-
Size
2.9MB
-
MD5
6576cd124f9e5d320e6567e2702b9d8d
-
SHA1
cf09d3e6711fc9fbc7b2b9adbc1f11430ed1e6e8
-
SHA256
0917e73cace00aec5b1925aff2be26b750ffa5e0b85357fae674a7197ef08545
-
SHA512
d9102e63b3cf71b8fb42f24d8b7dee64b3fc3fa7c2f15104e32bd12e59ecc1eed3b7d6fa42882ec71a7b37eb427bc6d8426cd9d0a1f22fad5e4119e6b0a4fd43
-
SSDEEP
49152:Lhk4wbh8XNWthzquloPkRaADGWacmNxC8vJ5LqpmFi38XpkMEq4:aVheNWzedsRIWgHC8bLliGSM8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 6576cd124f9e5d320e6567e2702b9d8d.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 6576cd124f9e5d320e6567e2702b9d8d.exe -
Loads dropped DLL 1 IoCs
pid Process 2772 6576cd124f9e5d320e6567e2702b9d8d.exe -
resource yara_rule behavioral1/memory/2772-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0008000000012232-10.dat upx behavioral1/files/0x0008000000012232-14.dat upx behavioral1/memory/2772-15-0x00000000036B0000-0x0000000003B9F000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2772 6576cd124f9e5d320e6567e2702b9d8d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2772 6576cd124f9e5d320e6567e2702b9d8d.exe 2740 6576cd124f9e5d320e6567e2702b9d8d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2740 2772 6576cd124f9e5d320e6567e2702b9d8d.exe 28 PID 2772 wrote to memory of 2740 2772 6576cd124f9e5d320e6567e2702b9d8d.exe 28 PID 2772 wrote to memory of 2740 2772 6576cd124f9e5d320e6567e2702b9d8d.exe 28 PID 2772 wrote to memory of 2740 2772 6576cd124f9e5d320e6567e2702b9d8d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6576cd124f9e5d320e6567e2702b9d8d.exe"C:\Users\Admin\AppData\Local\Temp\6576cd124f9e5d320e6567e2702b9d8d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\6576cd124f9e5d320e6567e2702b9d8d.exeC:\Users\Admin\AppData\Local\Temp\6576cd124f9e5d320e6567e2702b9d8d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD539a52a9044c6107efaffe1993a7fac08
SHA17c719c2e83a232d0f564e46e4adb45e98c3dce03
SHA256f4eaaf43542ea6018159cdeb9f8a5fc785c351379ab2097cc4982424789f9b46
SHA512cca92ebd5acc27293e99ca69199785a26d4dc70b3068cb7745322b1fa66f817f178bdaa28952205e17c9006f2b146ec502167434fc81e22c02438ce9dc4d178a
-
Filesize
1.1MB
MD58034f05ffa8e60e448537c045ac19f00
SHA1acffbefc32530ad09d718e3daad34d24169f6ec4
SHA256c9514b879a31f25ef112fc49e477b2783fd22a6b95c80a46f26b1863b73d8e39
SHA512536a41aeea21bcfb52d69b9d36e22d2c0b9ecf03184b60c98d13f048691706b09eb6850e57f81fcca4ede64a4f23118608ff65ae030f82e3d9bd37e01fe11f28