Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 00:20
Behavioral task
behavioral1
Sample
733e2753df1b6f5b29d7a26b44692e42.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
733e2753df1b6f5b29d7a26b44692e42.exe
Resource
win10v2004-20231215-en
General
-
Target
733e2753df1b6f5b29d7a26b44692e42.exe
-
Size
5.8MB
-
MD5
733e2753df1b6f5b29d7a26b44692e42
-
SHA1
01f4c80e167d6a1861e2831d49ab12bd0cea4f2f
-
SHA256
a77240470c96c09a15a5e685d11a901d1577a9f2ee8cbc09e448a1a1dd899ae7
-
SHA512
e4d00ac5ea4a46d3c3dcef427933e9834d48d3fac8a341a1d0c523645702ee4549c01b600781cd57bfb14db48182333f837172f1626632ebd2cf9fcac1ccf3bb
-
SSDEEP
98304:5NRapSRxQJgg3gnl/IVUs1jePspLZqKxPDrEgg3gnl/IVUs1jePs:5NRam6Pgl/iBiPsLrQgl/iBiP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 733e2753df1b6f5b29d7a26b44692e42.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 733e2753df1b6f5b29d7a26b44692e42.exe -
resource yara_rule behavioral2/memory/3228-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000c000000023171-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3228 733e2753df1b6f5b29d7a26b44692e42.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3228 733e2753df1b6f5b29d7a26b44692e42.exe 3292 733e2753df1b6f5b29d7a26b44692e42.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 3292 3228 733e2753df1b6f5b29d7a26b44692e42.exe 88 PID 3228 wrote to memory of 3292 3228 733e2753df1b6f5b29d7a26b44692e42.exe 88 PID 3228 wrote to memory of 3292 3228 733e2753df1b6f5b29d7a26b44692e42.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\733e2753df1b6f5b29d7a26b44692e42.exe"C:\Users\Admin\AppData\Local\Temp\733e2753df1b6f5b29d7a26b44692e42.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\733e2753df1b6f5b29d7a26b44692e42.exeC:\Users\Admin\AppData\Local\Temp\733e2753df1b6f5b29d7a26b44692e42.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5a9f55290d96359f1f080d68b5129d8aa
SHA1879d891ada274de8184075e87b25a2b4c3569376
SHA2561ebc8074b33a56204f7a1c0cc24db62e528aaac495535b283e457086ebb65a81
SHA5126361615b4248c58702dee262ebd121bd3cfb727723c5d42872e5296f0fcdec6c466798f89681fa598ccd6ff87bb3a863278d0e6923068832923f66c6b03c33df