Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 12:06
Behavioral task
behavioral1
Sample
723298a65c0b1d68559d257911bef277.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
723298a65c0b1d68559d257911bef277.exe
Resource
win10v2004-20231215-en
General
-
Target
723298a65c0b1d68559d257911bef277.exe
-
Size
10.7MB
-
MD5
723298a65c0b1d68559d257911bef277
-
SHA1
1ecba3c4323655ddca5af3d45165ee231f826df5
-
SHA256
09ea5169d790a976bc1d68791debe4cf11137946686065d06fa9336bbb1d27ce
-
SHA512
749958ce085dcc6c9e027fbd0a7dc9c57d3a4fd5139f50c40105dadfe46c236d4947f0a65e7878f74454ca0d48e5817262963a85306391614638fbb248aeccf9
-
SSDEEP
196608:FXQKOfKuqQA1R8X4fKuqMIVF5dAQQfKuqQA1R8X4fKuq:R7OfZqf/s4fZqjT5dABfZqf/s4fZq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1000 723298a65c0b1d68559d257911bef277.exe -
Executes dropped EXE 1 IoCs
pid Process 1000 723298a65c0b1d68559d257911bef277.exe -
resource yara_rule behavioral2/memory/956-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0002000000022775-13.dat upx behavioral2/memory/1000-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 956 723298a65c0b1d68559d257911bef277.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 956 723298a65c0b1d68559d257911bef277.exe 1000 723298a65c0b1d68559d257911bef277.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 1000 956 723298a65c0b1d68559d257911bef277.exe 89 PID 956 wrote to memory of 1000 956 723298a65c0b1d68559d257911bef277.exe 89 PID 956 wrote to memory of 1000 956 723298a65c0b1d68559d257911bef277.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe"C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exeC:\Users\Admin\AppData\Local\Temp\723298a65c0b1d68559d257911bef277.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.7MB
MD5cbd26cb6c9d25de7a2d0a774cc3d0c1c
SHA17beb1254daf40351602f6e6ff3c6253ab83835f5
SHA256f6044190d3dde5f86c2ec1eaaa0737ad26623bda1d99fa4847b9f4031d022816
SHA512a2b1aaa9d8e2324aeb0c82514799c02cd86c62e4095f338d5ec2c2f8cc25d119d3f48c0769f74e6ffb5971d84f95cd2b3cf38280d7582eae63fecdcad7b45abf