Analysis
-
max time kernel
92s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
74f9bd0eb5c9c650acf5f3823a77c8f4.exe
Resource
win7-20231215-en
General
-
Target
74f9bd0eb5c9c650acf5f3823a77c8f4.exe
-
Size
82KB
-
MD5
74f9bd0eb5c9c650acf5f3823a77c8f4
-
SHA1
b2e3a14315ee75be70c8163d0d73208d23c91d6a
-
SHA256
ff47854734fdff34d342d851cd90bef5f0a9b8fc3af8d45ffe56daf1d90ecf93
-
SHA512
bf95848f240f1d7e546b2b7004a7e9d5ae91d5e6b1486846ca4843e080e87525714ac7c3cd66a90de5c65ca2889cae712cca1c83edc2f36d95a6131b1b3cca9f
-
SSDEEP
1536:V5k3lLpvvUeyN1QKSi7Buydt+HtYMX+2C/rSyCPY96Dg7vbJH5eoQfhlIK:V5k3lLpv8ek1QKFeNO2YwE7vbJZrQJlf
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
74f9bd0eb5c9c650acf5f3823a77c8f4.exepid process 3816 74f9bd0eb5c9c650acf5f3823a77c8f4.exe -
Executes dropped EXE 1 IoCs
Processes:
74f9bd0eb5c9c650acf5f3823a77c8f4.exepid process 3816 74f9bd0eb5c9c650acf5f3823a77c8f4.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
74f9bd0eb5c9c650acf5f3823a77c8f4.exepid process 1552 74f9bd0eb5c9c650acf5f3823a77c8f4.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
74f9bd0eb5c9c650acf5f3823a77c8f4.exe74f9bd0eb5c9c650acf5f3823a77c8f4.exepid process 1552 74f9bd0eb5c9c650acf5f3823a77c8f4.exe 3816 74f9bd0eb5c9c650acf5f3823a77c8f4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
74f9bd0eb5c9c650acf5f3823a77c8f4.exedescription pid process target process PID 1552 wrote to memory of 3816 1552 74f9bd0eb5c9c650acf5f3823a77c8f4.exe 74f9bd0eb5c9c650acf5f3823a77c8f4.exe PID 1552 wrote to memory of 3816 1552 74f9bd0eb5c9c650acf5f3823a77c8f4.exe 74f9bd0eb5c9c650acf5f3823a77c8f4.exe PID 1552 wrote to memory of 3816 1552 74f9bd0eb5c9c650acf5f3823a77c8f4.exe 74f9bd0eb5c9c650acf5f3823a77c8f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f9bd0eb5c9c650acf5f3823a77c8f4.exe"C:\Users\Admin\AppData\Local\Temp\74f9bd0eb5c9c650acf5f3823a77c8f4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\74f9bd0eb5c9c650acf5f3823a77c8f4.exeC:\Users\Admin\AppData\Local\Temp\74f9bd0eb5c9c650acf5f3823a77c8f4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3816
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\74f9bd0eb5c9c650acf5f3823a77c8f4.exeFilesize
82KB
MD5e13d8b799b812cd0b0bacbd28e5841ac
SHA1fc304a05e7bd761766af628306eff86cd26f0426
SHA2567fd79ce768650515f1f3122d9954c2239027abfcf3a60a80aafd1d8f8a1d2999
SHA512b810d80f987def08cdfd583e2a7f269694a5ce4640e58f2e7be53307f2d06649d47b2ddab897cb1643c89db79126f2e94513be3142a2c91bdf8d9494c0565880
-
memory/1552-0-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1552-1-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/1552-2-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1552-11-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3816-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3816-14-0x0000000001430000-0x000000000145F000-memory.dmpFilesize
188KB
-
memory/3816-25-0x00000000014F0000-0x000000000150B000-memory.dmpFilesize
108KB
-
memory/3816-20-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB