Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 11:00
Behavioral task
behavioral1
Sample
74851aa4b3f0d7d94eb0646ab1a943b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74851aa4b3f0d7d94eb0646ab1a943b7.exe
Resource
win10v2004-20231215-en
General
-
Target
74851aa4b3f0d7d94eb0646ab1a943b7.exe
-
Size
1.5MB
-
MD5
74851aa4b3f0d7d94eb0646ab1a943b7
-
SHA1
970896c64a444ad5c513b22e5c1f13b380d7fa09
-
SHA256
5f1008040a18fe49a28b93b4ae09c481de6e4560031b1b701a84357e25fde6d4
-
SHA512
9de97d422298835f6c2a958ad047c03388cd4c2b6ba4824cda2b3c9bdbb1b6d573b497fd36911eb2a135a90fa294dfac7bc1a1639a3f13fcf012cdcaac699d5b
-
SSDEEP
24576:ebqNc7OmU4AveFMdsFN9nh6pYTwvwcCigJwH/35pzeOI+XMD8wvyIlxlhW:JNc7OmU4VsI9XTwv9SA/3Tztalxlh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4836 74851aa4b3f0d7d94eb0646ab1a943b7.exe -
Executes dropped EXE 1 IoCs
pid Process 4836 74851aa4b3f0d7d94eb0646ab1a943b7.exe -
resource yara_rule behavioral2/memory/5056-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000e00000002314b-11.dat upx behavioral2/memory/4836-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5056 74851aa4b3f0d7d94eb0646ab1a943b7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5056 74851aa4b3f0d7d94eb0646ab1a943b7.exe 4836 74851aa4b3f0d7d94eb0646ab1a943b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4836 5056 74851aa4b3f0d7d94eb0646ab1a943b7.exe 86 PID 5056 wrote to memory of 4836 5056 74851aa4b3f0d7d94eb0646ab1a943b7.exe 86 PID 5056 wrote to memory of 4836 5056 74851aa4b3f0d7d94eb0646ab1a943b7.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\74851aa4b3f0d7d94eb0646ab1a943b7.exe"C:\Users\Admin\AppData\Local\Temp\74851aa4b3f0d7d94eb0646ab1a943b7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\74851aa4b3f0d7d94eb0646ab1a943b7.exeC:\Users\Admin\AppData\Local\Temp\74851aa4b3f0d7d94eb0646ab1a943b7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5d92542e7f9711c6fb3f425f66c00c6ba
SHA1dd5b8139a4519dfc678d20a9120b78cf5d7014a8
SHA25693034659026ebafdfa89fb97ae216722a01a51a5f8facb349d29d63af3551c64
SHA5121f064c0bc947a2521ef77b94ad7f1e5382ef2d1a074162cd38e75793c089196843b7d0e40b770083433f94483a21ac85b3b6441ff3348d8f2b4977962acc901f