Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
71edc658e258b45292770298c64a72ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71edc658e258b45292770298c64a72ce.exe
Resource
win10v2004-20231215-en
General
-
Target
71edc658e258b45292770298c64a72ce.exe
-
Size
82KB
-
MD5
71edc658e258b45292770298c64a72ce
-
SHA1
fce861db8ea985167e240eb7e4cf545602b98750
-
SHA256
9a3f7dcc05e2331fca1471ed6444984aef5e1c89ec7b972deff782b9f782c15c
-
SHA512
d56759eca2ffb857dd4145cb4093b9dabce24f0ddbb1b91ae0b52c10b5aaa472bd061f2c6f96d562d4354f824118f71655ecc54f08828fa7435b76a89acb7da8
-
SSDEEP
1536:rer43SJ+zrcs/eSh8l3ZlGpoaE+tTGgcn5cFUzP1MplTbBh:rerPSh8qpoaPtT7f0YdBh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3864 71edc658e258b45292770298c64a72ce.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 71edc658e258b45292770298c64a72ce.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1332 71edc658e258b45292770298c64a72ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1332 71edc658e258b45292770298c64a72ce.exe 3864 71edc658e258b45292770298c64a72ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1332 wrote to memory of 3864 1332 71edc658e258b45292770298c64a72ce.exe 89 PID 1332 wrote to memory of 3864 1332 71edc658e258b45292770298c64a72ce.exe 89 PID 1332 wrote to memory of 3864 1332 71edc658e258b45292770298c64a72ce.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe"C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exeC:\Users\Admin\AppData\Local\Temp\71edc658e258b45292770298c64a72ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c4809b40d78319cd09561a83c8806129
SHA163c057183d113f56e60d1aad53aaf5f993488797
SHA256f460d4c949a259ba08bdba041ed42c9ef0dbe8b51d5415931285ee4e4696c98a
SHA51211634c34156fcae6e4929083febb4f91b1fb9269f498eeb5908c1a14995c9fcc58138b58d8dd9a61f63b09daf15aa128cc3d0c94268e9dacf4030e8b00f3e99a