Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
Resource
win10v2004-20231215-en
General
-
Target
6fc2034a1083d6a850b2c4d0f5a2a0ed.exe
-
Size
105KB
-
MD5
6fc2034a1083d6a850b2c4d0f5a2a0ed
-
SHA1
a3641420dd8be4207cc3a4c276d0dd9330960f3e
-
SHA256
4cc07a1b14f2b684291cb4dba3025e03e99e33c3160bfc35a5e8a273d6ec1d13
-
SHA512
a9afd1196049fb6ca542c59a4f54b56884ae4e46cd639fdb361104a0ccece097957a6e7f178cc00f9ebb0bac50472c8738e2652181b706c9339b06f14ccd0719
-
SSDEEP
1536:m+MCEWd57dyQojkjMaia35qGxb34xWZIT3EpkO60Kl6EZ6FL6Q2hiTt6DtW9YH:mJCf7dD8aLp1x4xl3Os0CF6FL6X1pW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4956 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Executes dropped EXE 1 IoCs
pid Process 4956 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3144 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3144 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 4956 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4956 3144 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 36 PID 3144 wrote to memory of 4956 3144 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 36 PID 3144 wrote to memory of 4956 3144 6fc2034a1083d6a850b2c4d0f5a2a0ed.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe"C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exeC:\Users\Admin\AppData\Local\Temp\6fc2034a1083d6a850b2c4d0f5a2a0ed.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5fcef5e4af32726e4d4d9ccdf9a2ad412
SHA10d89a3f957721e9794e40697a9dffc278d3da1da
SHA2565bc43f3d748dab7600160131b176810f6b08e7772f4aff14091a5f1995d02b26
SHA5121fba38985967c586efb2701b657348ec19f2b6fc9809915c4dd10673cac404f559f7ded7c36ebc78aac4146020858135f8f26c0b169fde9436402e7a056abb7f