Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
681cbf353e295092801b06d00b8a9686.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
681cbf353e295092801b06d00b8a9686.exe
Resource
win10v2004-20231222-en
General
-
Target
681cbf353e295092801b06d00b8a9686.exe
-
Size
82KB
-
MD5
681cbf353e295092801b06d00b8a9686
-
SHA1
7ebc6778897e43d920befcf7ff75ff9d8c728e65
-
SHA256
e6a86c5d747e7336219cfa141a54d6567ffc75ae771c31e4f96d774b459b1ded
-
SHA512
419f8dac9981093ed18cdda5025f8dc4fe07456b952682e11eb7e5df125d1b312085fd534775101248cf385071b6f6ef23d5f7fe9e17726f668d60da2421a054
-
SSDEEP
1536:zY0Q8j6VWJEOlSvEMMaXpPcj6v0M9gnleleMJoUApn2EBjkmIS9xEdAcV/:00kE+9tXpPcj6RgnlRMJzAptBnnS/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1772 681cbf353e295092801b06d00b8a9686.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 681cbf353e295092801b06d00b8a9686.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3080 681cbf353e295092801b06d00b8a9686.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3080 681cbf353e295092801b06d00b8a9686.exe 1772 681cbf353e295092801b06d00b8a9686.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1772 3080 681cbf353e295092801b06d00b8a9686.exe 89 PID 3080 wrote to memory of 1772 3080 681cbf353e295092801b06d00b8a9686.exe 89 PID 3080 wrote to memory of 1772 3080 681cbf353e295092801b06d00b8a9686.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\681cbf353e295092801b06d00b8a9686.exe"C:\Users\Admin\AppData\Local\Temp\681cbf353e295092801b06d00b8a9686.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\681cbf353e295092801b06d00b8a9686.exeC:\Users\Admin\AppData\Local\Temp\681cbf353e295092801b06d00b8a9686.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f23bc0578c77dc4ddac31ead46979029
SHA17cebc82c28a50f6fcd11a773d2ca32934102a27a
SHA2562c378b5dd9b1fb87e731e57d718170fbabc15d8a10276ebb3fcb2a2574c56248
SHA512223edfc76e9297cd998650c498dff45371743ece2b3c5ecec30fe37911d82c529e73938e0e5d1a3bcfb3eb94b30addb0c900487563530254dd3f9827d537088a