Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
71edc658e258b45292770298c64a72ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71edc658e258b45292770298c64a72ce.exe
Resource
win10v2004-20231215-en
General
-
Target
71edc658e258b45292770298c64a72ce.exe
-
Size
82KB
-
MD5
71edc658e258b45292770298c64a72ce
-
SHA1
fce861db8ea985167e240eb7e4cf545602b98750
-
SHA256
9a3f7dcc05e2331fca1471ed6444984aef5e1c89ec7b972deff782b9f782c15c
-
SHA512
d56759eca2ffb857dd4145cb4093b9dabce24f0ddbb1b91ae0b52c10b5aaa472bd061f2c6f96d562d4354f824118f71655ecc54f08828fa7435b76a89acb7da8
-
SSDEEP
1536:rer43SJ+zrcs/eSh8l3ZlGpoaE+tTGgcn5cFUzP1MplTbBh:rerPSh8qpoaPtT7f0YdBh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 71edc658e258b45292770298c64a72ce.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 71edc658e258b45292770298c64a72ce.exe -
Loads dropped DLL 1 IoCs
pid Process 2800 71edc658e258b45292770298c64a72ce.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2800 71edc658e258b45292770298c64a72ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2800 71edc658e258b45292770298c64a72ce.exe 2056 71edc658e258b45292770298c64a72ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2056 2800 71edc658e258b45292770298c64a72ce.exe 29 PID 2800 wrote to memory of 2056 2800 71edc658e258b45292770298c64a72ce.exe 29 PID 2800 wrote to memory of 2056 2800 71edc658e258b45292770298c64a72ce.exe 29 PID 2800 wrote to memory of 2056 2800 71edc658e258b45292770298c64a72ce.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe"C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exeC:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5ef47ddf78b7bba63d2f362c3a9452bbc
SHA1e5661a686d8105ba47f430ef52d9396322c20505
SHA2569b680a041249ebf8392642b4a480c31c345cf5aa0372faf1e7341aee9557f54c
SHA512b7f83a3aff330dff62fa4ae7f4840fb9306dda92060c05421143f29566752bf59996f405f8cd0ebde42f795e29fa36ace55b79a74754c503b31e9d8266c90981