Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 23:22
Behavioral task
behavioral1
Sample
7320a9b5094b71e8024eabde572315f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7320a9b5094b71e8024eabde572315f0.exe
Resource
win10v2004-20231222-en
General
-
Target
7320a9b5094b71e8024eabde572315f0.exe
-
Size
2.7MB
-
MD5
7320a9b5094b71e8024eabde572315f0
-
SHA1
f629ce7c593cb781228c001bac1f975ec155f3d7
-
SHA256
b1185174f488fee7e7507f71354454efe40d3db14963778b94bbd3dea7ea9f4e
-
SHA512
e7bdac0bd331dd2bd0d8a54ee569b50e53d643542edc4bc3730ca1cf5f8381e6d6f4f4fbcdacf4c356fbb5e087a048ae2b2b6a9b296b83b75b36ee71f4d0c8c8
-
SSDEEP
49152:QGv04PEhqgmCbcylsUeUua0md21TL8XcsvLo8QCv:QGc4PEhEcHpua0hIMsvLo8QC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4208 7320a9b5094b71e8024eabde572315f0.exe -
Executes dropped EXE 1 IoCs
pid Process 4208 7320a9b5094b71e8024eabde572315f0.exe -
resource yara_rule behavioral2/memory/3004-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x00080000000231f0-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3004 7320a9b5094b71e8024eabde572315f0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3004 7320a9b5094b71e8024eabde572315f0.exe 4208 7320a9b5094b71e8024eabde572315f0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4208 3004 7320a9b5094b71e8024eabde572315f0.exe 85 PID 3004 wrote to memory of 4208 3004 7320a9b5094b71e8024eabde572315f0.exe 85 PID 3004 wrote to memory of 4208 3004 7320a9b5094b71e8024eabde572315f0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7320a9b5094b71e8024eabde572315f0.exe"C:\Users\Admin\AppData\Local\Temp\7320a9b5094b71e8024eabde572315f0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\7320a9b5094b71e8024eabde572315f0.exeC:\Users\Admin\AppData\Local\Temp\7320a9b5094b71e8024eabde572315f0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD540385d31aac00c08c27d7b1123f2bc8a
SHA13ed36aa1a09f16a5105c9503f19e374382c62d9f
SHA2569fc39962e14f0d91d281559e655d87a5b79dd73d5c8df902d8912e3a7df07471
SHA512584cca2d7ceba3d1b4a0bf8cb426e2a8cdbd60e0b4ba85ea086c9035eb61cc329ab6e60ac8e43344e421143d8cb90ed716186995ce30f488d1e8185b75ca3aa6