Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 03:35
Behavioral task
behavioral1
Sample
73a157bef12644e247c304d49fa48ac1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73a157bef12644e247c304d49fa48ac1.exe
Resource
win10v2004-20231215-en
General
-
Target
73a157bef12644e247c304d49fa48ac1.exe
-
Size
1.3MB
-
MD5
73a157bef12644e247c304d49fa48ac1
-
SHA1
ee94892f4d845815b9d31c45be23a80e1918b724
-
SHA256
cf3451dd86c4d507556bda59fc39722484c200d948b7d51e564c954854116c1d
-
SHA512
cddaefd6eeb023762e2f5a228db0a326a90173594d3e79f646b042d65080c1835ac7bda310b63b4e23cd9b73bec1688d06bf5f20c1907403e6e08dadc8251c27
-
SSDEEP
24576:oGiTGuWAn02arHuGzPTOMwUGZPHQgCZRsCV1KsuG68XCxm+DbrtKgU9/9Us:n0GvAnMrfPi/4gChVZXEmTR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3640 73a157bef12644e247c304d49fa48ac1.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 73a157bef12644e247c304d49fa48ac1.exe -
resource yara_rule behavioral2/memory/1844-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0007000000023149-11.dat upx behavioral2/memory/3640-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 73a157bef12644e247c304d49fa48ac1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 73a157bef12644e247c304d49fa48ac1.exe 3640 73a157bef12644e247c304d49fa48ac1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3640 1844 73a157bef12644e247c304d49fa48ac1.exe 87 PID 1844 wrote to memory of 3640 1844 73a157bef12644e247c304d49fa48ac1.exe 87 PID 1844 wrote to memory of 3640 1844 73a157bef12644e247c304d49fa48ac1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a157bef12644e247c304d49fa48ac1.exe"C:\Users\Admin\AppData\Local\Temp\73a157bef12644e247c304d49fa48ac1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\73a157bef12644e247c304d49fa48ac1.exeC:\Users\Admin\AppData\Local\Temp\73a157bef12644e247c304d49fa48ac1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f15497c611e40b18dfebe3bd9f18f853
SHA1cd7ee4280636d56f40c6ac5ec4581dc77f44447e
SHA25619e4057711365d72f4993b28364fa8c0fe01001f5ca5571766db9b8683bdaa6b
SHA512330c181fd0fecbbbbb03a1b4c4e7bb0ad2d603891e36252c9f2db9bbf824cac7f9610b0035a250cff8df45aaebf6892825e2b2d5d1192ebaeeecf1d3f28f88a6