Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
712d0ae0e7246c3e03ce825ea1df3484.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
712d0ae0e7246c3e03ce825ea1df3484.exe
Resource
win10v2004-20231215-en
General
-
Target
712d0ae0e7246c3e03ce825ea1df3484.exe
-
Size
84KB
-
MD5
712d0ae0e7246c3e03ce825ea1df3484
-
SHA1
894bf32acdb2802a697f765534e1cb8aba40cc43
-
SHA256
6541b8cbca432bb6de9446c37e6f2c93c912e76e7728a703f658b9bfa1793667
-
SHA512
807c1ad4bd22a20be181b626d1815c868912652e36cbc69b46770d11f4a83fdf4cc67675466baa7ca2a78feb30766091e1f50dbb90e0250e66af0bbfda1b388e
-
SSDEEP
1536:geE5tAO/GnCeSVAkrTdcPwaJb50dBMgzaMA9wHekl8C8FKV4FiQzszC1VjBDPWJZ:gp/7x7WG5YJsHz1Am+klFjnCBTPWJZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 712d0ae0e7246c3e03ce825ea1df3484.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3356 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3356 712d0ae0e7246c3e03ce825ea1df3484.exe 3008 712d0ae0e7246c3e03ce825ea1df3484.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3008 3356 712d0ae0e7246c3e03ce825ea1df3484.exe 87 PID 3356 wrote to memory of 3008 3356 712d0ae0e7246c3e03ce825ea1df3484.exe 87 PID 3356 wrote to memory of 3008 3356 712d0ae0e7246c3e03ce825ea1df3484.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe"C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exeC:\Users\Admin\AppData\Local\Temp\712d0ae0e7246c3e03ce825ea1df3484.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD567fb17b36859b61c1c2bc87c886750e5
SHA1341720dff465b4ad52ce3f2efff8f40f4296343d
SHA256a19c5aeaa1eb70fa79aa20cbe7f9ead8d8a492924fe363dfd856d18576b44a85
SHA512f129158bdc694420def89eb9d2e147909d150bbf737ae98538d850f0a77b84bcdba39a53fb29952576b8def5b8ca7e2584d59c2501b9309a77992657fcd7e096