Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
680544c38e83ad7f8e8a4567d7ebd00a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
680544c38e83ad7f8e8a4567d7ebd00a.exe
Resource
win10v2004-20231215-en
General
-
Target
680544c38e83ad7f8e8a4567d7ebd00a.exe
-
Size
82KB
-
MD5
680544c38e83ad7f8e8a4567d7ebd00a
-
SHA1
0224aae57492567daf9cee527f05a8369cb372c9
-
SHA256
f09c43b3713a37766c2e57e3eb322fca610821cdb6c025c607aa916cb62f707c
-
SHA512
3a30b16361aa19ee342d85eaa4060fed5eee2cf50bb595755de14742f0848d6b9010d28e4eb1a97d3d29cbcbfc52aa474611351bc7bfb5361887b8670f7263c4
-
SSDEEP
1536:h5QMctLSs9oyy5xv9cpR6WtmXoojE+36RFato0U5y+Br+fBgrU0ne3Ee:YMq9oXuKWb+3M82X5y+Braghe3r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3316 680544c38e83ad7f8e8a4567d7ebd00a.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 680544c38e83ad7f8e8a4567d7ebd00a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 736 680544c38e83ad7f8e8a4567d7ebd00a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 736 680544c38e83ad7f8e8a4567d7ebd00a.exe 3316 680544c38e83ad7f8e8a4567d7ebd00a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 736 wrote to memory of 3316 736 680544c38e83ad7f8e8a4567d7ebd00a.exe 88 PID 736 wrote to memory of 3316 736 680544c38e83ad7f8e8a4567d7ebd00a.exe 88 PID 736 wrote to memory of 3316 736 680544c38e83ad7f8e8a4567d7ebd00a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\680544c38e83ad7f8e8a4567d7ebd00a.exe"C:\Users\Admin\AppData\Local\Temp\680544c38e83ad7f8e8a4567d7ebd00a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\680544c38e83ad7f8e8a4567d7ebd00a.exeC:\Users\Admin\AppData\Local\Temp\680544c38e83ad7f8e8a4567d7ebd00a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD590c7c51de2be79cf3bca33c84246b5cc
SHA13d8352542637880008e04724446eab2c230a6e0f
SHA2562c504cecd33419af567bf43979a0c8f9d3b16674963fad0bc2d547a476d8eea2
SHA5128f70373138ffc8c870ffa518a795aeadbf3c121a312af7d4f94b6680a1f7d178a0e049b1f7841f4c172e8e98f6491fa9a43abc5f5f4a17a7eeaed3654dc78a92