Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 04:44
Behavioral task
behavioral1
Sample
66bab12854be37d1476705de07334f8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66bab12854be37d1476705de07334f8f.exe
Resource
win10v2004-20231222-en
General
-
Target
66bab12854be37d1476705de07334f8f.exe
-
Size
1.3MB
-
MD5
66bab12854be37d1476705de07334f8f
-
SHA1
3fc3c758d87e188d1bd23f6b41c5b94be1fcd400
-
SHA256
6589c584740db9ddfa6929ed6610e86bf6762be51898c59a3faf7e04b5e6cd6d
-
SHA512
21e665eba4bda87d262050bedb99f6041c8eb2cfca7c3717106a8dc035de8859894cd7c03d77c045907059f2614b3fb6d941d5499f212d47a392efe595d0029c
-
SSDEEP
24576:Ae0XCbaaHEiTLZoKWY80J3XnT9VQGVU0FqWjLk4P7v9H7M1WO:QCmWvZ6I3DgGVUAAwEf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2440 66bab12854be37d1476705de07334f8f.exe -
Executes dropped EXE 1 IoCs
pid Process 2440 66bab12854be37d1476705de07334f8f.exe -
Loads dropped DLL 1 IoCs
pid Process 828 66bab12854be37d1476705de07334f8f.exe -
resource yara_rule behavioral1/memory/828-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012022-10.dat upx behavioral1/memory/828-12-0x0000000003620000-0x0000000003B0F000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 828 66bab12854be37d1476705de07334f8f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 828 66bab12854be37d1476705de07334f8f.exe 2440 66bab12854be37d1476705de07334f8f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 2440 828 66bab12854be37d1476705de07334f8f.exe 28 PID 828 wrote to memory of 2440 828 66bab12854be37d1476705de07334f8f.exe 28 PID 828 wrote to memory of 2440 828 66bab12854be37d1476705de07334f8f.exe 28 PID 828 wrote to memory of 2440 828 66bab12854be37d1476705de07334f8f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\66bab12854be37d1476705de07334f8f.exe"C:\Users\Admin\AppData\Local\Temp\66bab12854be37d1476705de07334f8f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\66bab12854be37d1476705de07334f8f.exeC:\Users\Admin\AppData\Local\Temp\66bab12854be37d1476705de07334f8f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD516b3187fe942719b0221cadc40eadb66
SHA10a068bf4df7a65557b4427dca043c171ff7c147e
SHA2566b7b75139018605f8e671920b81e6e1e299e61a5e9658886e5fea5e3f5b16f99
SHA512cfcfe12b10298e36c4fe755be23d75396da6497282efcb48fae9690efeaae7fb26564a6b9a3719057d82cb5a1c76579874698cd3beced66eb46037337ec82e02