Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
6802a02dcc78e824c4a48e4744b7b413.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6802a02dcc78e824c4a48e4744b7b413.exe
Resource
win10v2004-20231215-en
General
-
Target
6802a02dcc78e824c4a48e4744b7b413.exe
-
Size
82KB
-
MD5
6802a02dcc78e824c4a48e4744b7b413
-
SHA1
48efcb02300a63efe29f4db34d75fd5424a58f6a
-
SHA256
5785011ff15b9722430bb98a21851fc58b42cc9cbade9dc76e9a0181e203c258
-
SHA512
ddf791e4cdf562ddcbff4689a5146704761067360b9fdeaec0ad5e5364d19611894f3f9d3717574dcbcf15ae86dbc7646c252a0a8d9deae2cc5ab33004fcef90
-
SSDEEP
1536:CVxKhPwmljnpzClEXJVPvVQlC/hoy8zv48wE0aLVd4aML+fzb:CVIhDFpzFWCZAv4k0lAfzb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3948 6802a02dcc78e824c4a48e4744b7b413.exe -
Executes dropped EXE 1 IoCs
pid Process 3948 6802a02dcc78e824c4a48e4744b7b413.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3156 6802a02dcc78e824c4a48e4744b7b413.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3156 6802a02dcc78e824c4a48e4744b7b413.exe 3948 6802a02dcc78e824c4a48e4744b7b413.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3948 3156 6802a02dcc78e824c4a48e4744b7b413.exe 88 PID 3156 wrote to memory of 3948 3156 6802a02dcc78e824c4a48e4744b7b413.exe 88 PID 3156 wrote to memory of 3948 3156 6802a02dcc78e824c4a48e4744b7b413.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6802a02dcc78e824c4a48e4744b7b413.exe"C:\Users\Admin\AppData\Local\Temp\6802a02dcc78e824c4a48e4744b7b413.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\6802a02dcc78e824c4a48e4744b7b413.exeC:\Users\Admin\AppData\Local\Temp\6802a02dcc78e824c4a48e4744b7b413.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c64e8f017d233761f7eecd40dc54ccf9
SHA1e6dbf60ad91f190e36514bfe06d40bdda7acbb11
SHA25691d85e7777a275ad990de4e7a922235d9dd11f4b16f6ee57056a9eabd7909070
SHA512a3805f2da79f4b49765d354b79b0612b68a643cd967bfeee7cf5a5d82ffb1db9062e5f6a5d192d39bf009ca9047bc625087c0240c3fd48670c87fc959bd3b424