Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 08:01
Behavioral task
behavioral1
Sample
71b33c02cb47b290008cc3495518e49e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71b33c02cb47b290008cc3495518e49e.exe
Resource
win10v2004-20231215-en
General
-
Target
71b33c02cb47b290008cc3495518e49e.exe
-
Size
2.9MB
-
MD5
71b33c02cb47b290008cc3495518e49e
-
SHA1
245d189f6fb62b8fdee239f3cedc337fdb135e2e
-
SHA256
2f8440e8defce0fe8882302f52e67c5b99d6303a384bb7b18d122e20a4762ff6
-
SHA512
1e0e18e8c438c81fdd87bcc440c30d7f072fd159cf06de57b5888b499c7da617b507bee51477f0b82b6ecb3506f04b3656f3a42fd2cae92c7913fcc574d21870
-
SSDEEP
49152:83e7Y480GU/KIQSYjX5ntsytlbiUN74NH5HUyNRcUsCVOzetdZJ:8A7GsKIQ11tsynbiU4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 71b33c02cb47b290008cc3495518e49e.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 71b33c02cb47b290008cc3495518e49e.exe -
resource yara_rule behavioral2/memory/1040-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00090000000231fc-11.dat upx behavioral2/memory/2176-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1040 71b33c02cb47b290008cc3495518e49e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1040 71b33c02cb47b290008cc3495518e49e.exe 2176 71b33c02cb47b290008cc3495518e49e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2176 1040 71b33c02cb47b290008cc3495518e49e.exe 87 PID 1040 wrote to memory of 2176 1040 71b33c02cb47b290008cc3495518e49e.exe 87 PID 1040 wrote to memory of 2176 1040 71b33c02cb47b290008cc3495518e49e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b33c02cb47b290008cc3495518e49e.exe"C:\Users\Admin\AppData\Local\Temp\71b33c02cb47b290008cc3495518e49e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\71b33c02cb47b290008cc3495518e49e.exeC:\Users\Admin\AppData\Local\Temp\71b33c02cb47b290008cc3495518e49e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD58fdb60dcf9608a1c4eb3ae4d2095cef6
SHA173e1224eba020e0e799b99bf5cb03dd0658234d8
SHA256263c18eac03f35e5f840f56046714343f66c053708b0db4de44835dd69ad3f90
SHA512161ad5cc843769932591f3d69154bcf0b28aa93bdcc898ccace6ffbf75f824a10b1bcd3744c8de27379a55b8dab70afce53e404e4401ce3c1546b13909500457