Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 03:59
Behavioral task
behavioral1
Sample
66a3c826ec9412faedee39e3bd6a72ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66a3c826ec9412faedee39e3bd6a72ba.exe
Resource
win10v2004-20231222-en
General
-
Target
66a3c826ec9412faedee39e3bd6a72ba.exe
-
Size
1.3MB
-
MD5
66a3c826ec9412faedee39e3bd6a72ba
-
SHA1
043aa5db05821eb6fdb82496bf84567c5e1a8fe6
-
SHA256
d94d8491b41e5a17e8a559c0adc8ed94ae4f27bf2070d6275e5ca2513e44defc
-
SHA512
dede95ab3cd0230b4e499282f090137ff9eb3c143a9f34d14bb9a539952daa1662c88fc928b2ef7b3b9f4032bfd2ceab89b8449306c8740fa050a8966eb9676e
-
SSDEEP
24576:ESAoVYO8AN8Y7I9ZjuHrNQFysymqC9Yyx6v53+r9yn4tP/yPslSvG:PzVaY7I9tesJzqCx6BuZA4tnyP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3084 66a3c826ec9412faedee39e3bd6a72ba.exe -
Executes dropped EXE 1 IoCs
pid Process 3084 66a3c826ec9412faedee39e3bd6a72ba.exe -
resource yara_rule behavioral2/memory/4960-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e630-12.dat upx behavioral2/memory/3084-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4960 66a3c826ec9412faedee39e3bd6a72ba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4960 66a3c826ec9412faedee39e3bd6a72ba.exe 3084 66a3c826ec9412faedee39e3bd6a72ba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3084 4960 66a3c826ec9412faedee39e3bd6a72ba.exe 88 PID 4960 wrote to memory of 3084 4960 66a3c826ec9412faedee39e3bd6a72ba.exe 88 PID 4960 wrote to memory of 3084 4960 66a3c826ec9412faedee39e3bd6a72ba.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a3c826ec9412faedee39e3bd6a72ba.exe"C:\Users\Admin\AppData\Local\Temp\66a3c826ec9412faedee39e3bd6a72ba.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\66a3c826ec9412faedee39e3bd6a72ba.exeC:\Users\Admin\AppData\Local\Temp\66a3c826ec9412faedee39e3bd6a72ba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD58516805ed348b15aaf73fbf0c62d092a
SHA1ab85676f36c4a727547842290308e4fdd467f90a
SHA2562230a6cbe973d5bfbb49651c4150ea3fc1a215c5ce6ec74acf89d2a121db5b37
SHA512349041b650a59d3e3cd5188c654cde9a3f177aba9bf26fcbd9917abc1e6f106e8f3b397e908a9c5b2336ca224df27b086aae92905c210a423350a0f646132161