Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 10:18
Behavioral task
behavioral1
Sample
675d5e9e912facfe376de63532000904.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
675d5e9e912facfe376de63532000904.exe
Resource
win10v2004-20231215-en
General
-
Target
675d5e9e912facfe376de63532000904.exe
-
Size
2.7MB
-
MD5
675d5e9e912facfe376de63532000904
-
SHA1
c13933cf5da7352f767bb2d7b43827b33e91a355
-
SHA256
a56e6394c333d8dd7544a9c80d49d9118ab02e94e5c4fe65e87ca0ab2c2fa446
-
SHA512
2c0bf23cf5cb14af409c84cf01c2fc3bec29e97d2916e4eef6697d32b433069118f81c0c7719073fb0674803a42d9c5715aa04b2a8ce5efa2e3c861ddf18e44c
-
SSDEEP
49152:K/ElOhy4USLLvrhwKmsFFNbucn367ooR9twivmN5WgNszxVqwbIDE0eejXahlR9j:K8s44UKLdLPxn3uooHtwOgWgKuwbIHw1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4528 675d5e9e912facfe376de63532000904.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 675d5e9e912facfe376de63532000904.exe -
resource yara_rule behavioral2/memory/3272-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0006000000023209-11.dat upx behavioral2/memory/4528-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3272 675d5e9e912facfe376de63532000904.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3272 675d5e9e912facfe376de63532000904.exe 4528 675d5e9e912facfe376de63532000904.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4528 3272 675d5e9e912facfe376de63532000904.exe 88 PID 3272 wrote to memory of 4528 3272 675d5e9e912facfe376de63532000904.exe 88 PID 3272 wrote to memory of 4528 3272 675d5e9e912facfe376de63532000904.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\675d5e9e912facfe376de63532000904.exe"C:\Users\Admin\AppData\Local\Temp\675d5e9e912facfe376de63532000904.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\675d5e9e912facfe376de63532000904.exeC:\Users\Admin\AppData\Local\Temp\675d5e9e912facfe376de63532000904.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD51bbf387c9280f0ce0578de7a92d68a68
SHA1a3c346aabd3ea0a9795b48e9d25b45df95f0a4b6
SHA2566c36677f5697797428824695ac6da8e01f999e15c7608d872c2b352b727945a8
SHA512ff5d51da4bc17cec21c7781f491c914057f2347f561402a0bd72d676c5a73ba50225c76cb386e7bdd758c7c0555fbf80175377b6795c91fc58bf5a65d8bde7a6