Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
712d0ae0e7246c3e03ce825ea1df3484.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
712d0ae0e7246c3e03ce825ea1df3484.exe
Resource
win10v2004-20231215-en
General
-
Target
712d0ae0e7246c3e03ce825ea1df3484.exe
-
Size
84KB
-
MD5
712d0ae0e7246c3e03ce825ea1df3484
-
SHA1
894bf32acdb2802a697f765534e1cb8aba40cc43
-
SHA256
6541b8cbca432bb6de9446c37e6f2c93c912e76e7728a703f658b9bfa1793667
-
SHA512
807c1ad4bd22a20be181b626d1815c868912652e36cbc69b46770d11f4a83fdf4cc67675466baa7ca2a78feb30766091e1f50dbb90e0250e66af0bbfda1b388e
-
SSDEEP
1536:geE5tAO/GnCeSVAkrTdcPwaJb50dBMgzaMA9wHekl8C8FKV4FiQzszC1VjBDPWJZ:gp/7x7WG5YJsHz1Am+klFjnCBTPWJZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2356 712d0ae0e7246c3e03ce825ea1df3484.exe -
Executes dropped EXE 1 IoCs
pid Process 2356 712d0ae0e7246c3e03ce825ea1df3484.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 712d0ae0e7246c3e03ce825ea1df3484.exe 2356 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2356 3048 712d0ae0e7246c3e03ce825ea1df3484.exe 29 PID 3048 wrote to memory of 2356 3048 712d0ae0e7246c3e03ce825ea1df3484.exe 29 PID 3048 wrote to memory of 2356 3048 712d0ae0e7246c3e03ce825ea1df3484.exe 29 PID 3048 wrote to memory of 2356 3048 712d0ae0e7246c3e03ce825ea1df3484.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe"C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exeC:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD57147d137ba2db31d67a2678b4192cddb
SHA1962883f7482890f5d93d13ff11b8a5c76f596828
SHA256b880e5ece5e31937a07c48e8292a92512a5fb3ae9f09c82c00b79a44c3ff4ce5
SHA5123d984033105da2d8d20e44b6b81383cf531ed64e521c568a1fc915492e868dcbee9818e109eed5d65ec30a2d98975e896ea90f3a33b43d1992b7b3ceccfbe27f