Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 14:59
Behavioral task
behavioral1
Sample
67e88e30b49feb5b7a3ae971b31bcd45.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67e88e30b49feb5b7a3ae971b31bcd45.exe
Resource
win10v2004-20231215-en
General
-
Target
67e88e30b49feb5b7a3ae971b31bcd45.exe
-
Size
1.3MB
-
MD5
67e88e30b49feb5b7a3ae971b31bcd45
-
SHA1
aa5535a7cf7d550d74afeb6712429aaeeecbb9c8
-
SHA256
beae372deaf5556bf6661052184ce56a2fcd0fd3987a35e6549fecbc1a001cda
-
SHA512
658fb9611deedfb3e7aef91202e654ab6f15cf14a9f32fa7bbdb3ac35adf263013967ed987c58e7f06ef7108821d89e521c33675cdc2efa6c7c1c26619513ff3
-
SSDEEP
24576:9KsJBz4L/BjvwXuG24epx0IN/tRPGDhJON9c2XLeQlBg+82C/vG:9KsJBzkBDkuG8pGClIDA9c2KQ7g+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4836 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Executes dropped EXE 1 IoCs
pid Process 4836 67e88e30b49feb5b7a3ae971b31bcd45.exe -
resource yara_rule behavioral2/memory/2024-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023108-12.dat upx behavioral2/memory/4836-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2024 67e88e30b49feb5b7a3ae971b31bcd45.exe 4836 67e88e30b49feb5b7a3ae971b31bcd45.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4836 2024 67e88e30b49feb5b7a3ae971b31bcd45.exe 86 PID 2024 wrote to memory of 4836 2024 67e88e30b49feb5b7a3ae971b31bcd45.exe 86 PID 2024 wrote to memory of 4836 2024 67e88e30b49feb5b7a3ae971b31bcd45.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe"C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exeC:\Users\Admin\AppData\Local\Temp\67e88e30b49feb5b7a3ae971b31bcd45.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58c976ef6a03d36993f0ecd7faca961c0
SHA15d7249fb224957ee1f2716d7cd3168c6b5622efe
SHA256bd2a8c13bfd836d5edd396c1dc9d95e484eba0fd7e04319b3e8d8ee0da724687
SHA5124bfd6a44bc06899fe8ccc1df80a485a166ab119b1cb240927a6b0f7c77aae2e3b5a40e9a6dae4c38b841807a0a56fe369f72b26aa48e27d11b7e17558ca03f0f