Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 07:03
Behavioral task
behavioral1
Sample
740951a543d1541ce2581458aec6482f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
740951a543d1541ce2581458aec6482f.exe
Resource
win10v2004-20231215-en
General
-
Target
740951a543d1541ce2581458aec6482f.exe
-
Size
5.8MB
-
MD5
740951a543d1541ce2581458aec6482f
-
SHA1
c8d490dbffcd7405d46459a5085d5344260d0c31
-
SHA256
87d8390a182c5202809dd8712f00761299806dd9e8693c36d7dcb0be30b6a904
-
SHA512
976256090d2be5df62c78394ae74f1aa15f1ee76bc8a50a93c95c3a1aa9565113526ea4bbf31bc45184e6c4007511bb74e6f02193e00a5f6f689e23dd8c0aef5
-
SSDEEP
98304:rIDEdXyhN8ZqCDHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:3IhN8Zqwauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 740951a543d1541ce2581458aec6482f.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 740951a543d1541ce2581458aec6482f.exe -
resource yara_rule behavioral2/memory/1952-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000600000002321a-11.dat upx behavioral2/memory/2220-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1952 740951a543d1541ce2581458aec6482f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1952 740951a543d1541ce2581458aec6482f.exe 2220 740951a543d1541ce2581458aec6482f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2220 1952 740951a543d1541ce2581458aec6482f.exe 88 PID 1952 wrote to memory of 2220 1952 740951a543d1541ce2581458aec6482f.exe 88 PID 1952 wrote to memory of 2220 1952 740951a543d1541ce2581458aec6482f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\740951a543d1541ce2581458aec6482f.exe"C:\Users\Admin\AppData\Local\Temp\740951a543d1541ce2581458aec6482f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\740951a543d1541ce2581458aec6482f.exeC:\Users\Admin\AppData\Local\Temp\740951a543d1541ce2581458aec6482f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5aaa3c7f367721acd486a088e33357127
SHA17ffc47af690ae91e1454f9c22b0f1027bbc5a916
SHA256d04a6a44bc176d4e415c838451bfeea764db1b4ea6ea67b1313a8d61113f2b29
SHA5127044b703e102e9ab11527a865700a0108f127e98d792cd2b9da5aa7d687fa6947d639698c82c198fac6113641d2009fab3f9bfda0886467cc2018bb597dcf86c