Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
66aa8ae69de311b922c57845b229bf26.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
66aa8ae69de311b922c57845b229bf26.exe
Resource
win10v2004-20231215-en
General
-
Target
66aa8ae69de311b922c57845b229bf26.exe
-
Size
165KB
-
MD5
66aa8ae69de311b922c57845b229bf26
-
SHA1
48e8c46472274f3bb5f0326c963970b30a5efe22
-
SHA256
e84e8e8203cdd771fef99c61ba3d1f376693afaa3c6838469a888f028bb39da4
-
SHA512
7f1cc2b3a5f24a4df3e35484f763950923933501a4b0ec077f67784cb595b5b56f2783d3e49402aa2621b6adc94dce281b266e46249f6a811c611306577c477b
-
SSDEEP
3072:JWUfsH/7opuZFPcI9D4uxuxANQwLKOk7SwP4aM0A0I7bKaHNoUBK:IH/7opuvd8uxuxWPkPP4wANKAA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 66aa8ae69de311b922c57845b229bf26.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 66aa8ae69de311b922c57845b229bf26.exe -
Loads dropped DLL 1 IoCs
pid Process 776 66aa8ae69de311b922c57845b229bf26.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 776 66aa8ae69de311b922c57845b229bf26.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 776 66aa8ae69de311b922c57845b229bf26.exe 2320 66aa8ae69de311b922c57845b229bf26.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 776 wrote to memory of 2320 776 66aa8ae69de311b922c57845b229bf26.exe 29 PID 776 wrote to memory of 2320 776 66aa8ae69de311b922c57845b229bf26.exe 29 PID 776 wrote to memory of 2320 776 66aa8ae69de311b922c57845b229bf26.exe 29 PID 776 wrote to memory of 2320 776 66aa8ae69de311b922c57845b229bf26.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\66aa8ae69de311b922c57845b229bf26.exe"C:\Users\Admin\AppData\Local\Temp\66aa8ae69de311b922c57845b229bf26.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\66aa8ae69de311b922c57845b229bf26.exeC:\Users\Admin\AppData\Local\Temp\66aa8ae69de311b922c57845b229bf26.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD57a272a8605764cedf020c1eab85e5214
SHA1dceff53498bf0a6753e3db09380b17f1e9cb246f
SHA2562ac052bb1e5bd93b42c2dcaa2ffaff365f29dad10aa70cd88c6aa4a340fceb71
SHA5121d7b41cf552061c0134b9c2bb2f121195d57d156d6daf671c1167be7c0fd85e0b433294ef43c965224bf57f6b859ec27aac627718cb8a4fc4223aa706ece1204