Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 10:44
Behavioral task
behavioral1
Sample
747d66d0e1bf70f3d469fce467df72a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
747d66d0e1bf70f3d469fce467df72a9.exe
Resource
win10v2004-20231215-en
General
-
Target
747d66d0e1bf70f3d469fce467df72a9.exe
-
Size
1.3MB
-
MD5
747d66d0e1bf70f3d469fce467df72a9
-
SHA1
5864d829d4b029db263f46b02277894c091efb24
-
SHA256
a972027264eebea9d9c1c2242115e80edd581572ba6614e7fdefa789b7b45c52
-
SHA512
e6d07149c835378dae2aaf729018a1f6cf5b57ebeaacf44733ee951867fd097bd1c10720a53527958c8c45cf3ec754a5c464400c761222754472af0fd3592462
-
SSDEEP
24576:lPzhBYN78bXJILlRh9/28l6EPJyYIe8JCpyoQgxdCDmV5Pmeir9MYT1jDHdLNWc:l9BEVxHo8l6EP0Yz6qyo7DBmeeXzJNp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4912 747d66d0e1bf70f3d469fce467df72a9.exe -
Executes dropped EXE 1 IoCs
pid Process 4912 747d66d0e1bf70f3d469fce467df72a9.exe -
resource yara_rule behavioral2/memory/2148-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000e00000002315f-11.dat upx behavioral2/memory/4912-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 747d66d0e1bf70f3d469fce467df72a9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2148 747d66d0e1bf70f3d469fce467df72a9.exe 4912 747d66d0e1bf70f3d469fce467df72a9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4912 2148 747d66d0e1bf70f3d469fce467df72a9.exe 87 PID 2148 wrote to memory of 4912 2148 747d66d0e1bf70f3d469fce467df72a9.exe 87 PID 2148 wrote to memory of 4912 2148 747d66d0e1bf70f3d469fce467df72a9.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\747d66d0e1bf70f3d469fce467df72a9.exe"C:\Users\Admin\AppData\Local\Temp\747d66d0e1bf70f3d469fce467df72a9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\747d66d0e1bf70f3d469fce467df72a9.exeC:\Users\Admin\AppData\Local\Temp\747d66d0e1bf70f3d469fce467df72a9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5330fd39964cfa9ef19c9c557fe5f810d
SHA177b5b5176b2e51e79f05be101705e1efe7fa0504
SHA256f348f9d98fccd38eb7f5421fc89edb6fda9b5a7b551f2b6ef5ecb62b627c6e97
SHA512cf6d8c41bff345bd63acdef75651643d313524cb9381e7b3116a37289ff91519f38672829fdbf53dd9c5a539011a5a7c689c289dab4f8aea29dc80a501d68215