Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 14:59
Behavioral task
behavioral1
Sample
67e88e30b49feb5b7a3ae971b31bcd45.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67e88e30b49feb5b7a3ae971b31bcd45.exe
Resource
win10v2004-20231215-en
General
-
Target
67e88e30b49feb5b7a3ae971b31bcd45.exe
-
Size
1.3MB
-
MD5
67e88e30b49feb5b7a3ae971b31bcd45
-
SHA1
aa5535a7cf7d550d74afeb6712429aaeeecbb9c8
-
SHA256
beae372deaf5556bf6661052184ce56a2fcd0fd3987a35e6549fecbc1a001cda
-
SHA512
658fb9611deedfb3e7aef91202e654ab6f15cf14a9f32fa7bbdb3ac35adf263013967ed987c58e7f06ef7108821d89e521c33675cdc2efa6c7c1c26619513ff3
-
SSDEEP
24576:9KsJBz4L/BjvwXuG24epx0IN/tRPGDhJON9c2XLeQlBg+82C/vG:9KsJBzkBDkuG8pGClIDA9c2KQ7g+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Loads dropped DLL 1 IoCs
pid Process 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe -
resource yara_rule behavioral1/memory/1936-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000d0000000122fa-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe 2384 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2384 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe 28 PID 1936 wrote to memory of 2384 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe 28 PID 1936 wrote to memory of 2384 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe 28 PID 1936 wrote to memory of 2384 1936 67e88e30b49feb5b7a3ae971b31bcd45.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe"C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exeC:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD586ee05f3c404ed0f73f165dfae1528ec
SHA1cf0584ea2913506be77330bd39e36ccfa9573fa3
SHA256b979ee372dc7afb45d89f0b802ec9516a9a582102f6a05439d21a82a5843a478
SHA51216f415783c3c899cf2ae7a8068f288707db9c6c80ccd0f8273989fe49131a31f27537b200ffbaadce3d965246e7673790e6852c86a963fd558bd1c727ab89868