Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 12:06
Behavioral task
behavioral1
Sample
723298a65c0b1d68559d257911bef277.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
723298a65c0b1d68559d257911bef277.exe
Resource
win10v2004-20231215-en
General
-
Target
723298a65c0b1d68559d257911bef277.exe
-
Size
10.7MB
-
MD5
723298a65c0b1d68559d257911bef277
-
SHA1
1ecba3c4323655ddca5af3d45165ee231f826df5
-
SHA256
09ea5169d790a976bc1d68791debe4cf11137946686065d06fa9336bbb1d27ce
-
SHA512
749958ce085dcc6c9e027fbd0a7dc9c57d3a4fd5139f50c40105dadfe46c236d4947f0a65e7878f74454ca0d48e5817262963a85306391614638fbb248aeccf9
-
SSDEEP
196608:FXQKOfKuqQA1R8X4fKuqMIVF5dAQQfKuqQA1R8X4fKuq:R7OfZqf/s4fZqjT5dABfZqf/s4fZq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2380 723298a65c0b1d68559d257911bef277.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 723298a65c0b1d68559d257911bef277.exe -
Loads dropped DLL 1 IoCs
pid Process 1320 723298a65c0b1d68559d257911bef277.exe -
resource yara_rule behavioral1/memory/1320-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c00000001224c-16.dat upx behavioral1/files/0x000c00000001224c-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1320 723298a65c0b1d68559d257911bef277.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1320 723298a65c0b1d68559d257911bef277.exe 2380 723298a65c0b1d68559d257911bef277.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2380 1320 723298a65c0b1d68559d257911bef277.exe 28 PID 1320 wrote to memory of 2380 1320 723298a65c0b1d68559d257911bef277.exe 28 PID 1320 wrote to memory of 2380 1320 723298a65c0b1d68559d257911bef277.exe 28 PID 1320 wrote to memory of 2380 1320 723298a65c0b1d68559d257911bef277.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe"C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exeC:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5530b1351515de4ca82af673bb41bfe3e
SHA1a65e2fa9bfdbd9f7618255e333ed50c68a0967ff
SHA256825b3a20b61d5748e055cb45440f6e9c049ce0184f4cc68e91420f06ac02a936
SHA512964f2ae5858e22ecf93abbe80f9325237620a1c478f807a6dd8fc687c97eda89c261c97f9968fe24b29c17a9d5d6d3e2689a3fc8d3704d8002b473b6e1e5389e
-
Filesize
627KB
MD55367e751a3ba45c7fd66550965d950ad
SHA1360f74d20564d97c9eb8de94051f3b928b78d58f
SHA256942aa117543765391bc89a173b8404b322d17865dff3e7fd887aadf536383209
SHA5123dfe3c815eab5afa745069d31621826d8125b681a0ae5380d4f3274734227b33d8ca66009ef4281f4539cec36fd0371705640805faeee29da55c8c90c48737ed