Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:36
Behavioral task
behavioral1
Sample
751c52cd42065e2c68e761ba9ea058ce.exe
Resource
win7-20231215-en
General
-
Target
751c52cd42065e2c68e761ba9ea058ce.exe
-
Size
2.9MB
-
MD5
751c52cd42065e2c68e761ba9ea058ce
-
SHA1
dd874a8738076c94eb2c5be3bd312965f720de3e
-
SHA256
0a3fee19ce5e36d114444cc2ba797c9154149ca1f81bc4ad55f457f91a85fd38
-
SHA512
417c5349c09a8184be9f4fbe565c6e169490504185fa2b36555abb1ddfe1b4cae9f11826f2f6924104b0c6faf1e6d34f1bb60fcd76f7d97e20c5f9226e3f8d57
-
SSDEEP
49152:xBWb7HdTTA6XGW9yAJ9NBxDBF4ScN74NH5HUyNRcUsCVOzetdZJ:/Wb7HdJWW9yy9NfNVc4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
751c52cd42065e2c68e761ba9ea058ce.exepid process 5116 751c52cd42065e2c68e761ba9ea058ce.exe -
Executes dropped EXE 1 IoCs
Processes:
751c52cd42065e2c68e761ba9ea058ce.exepid process 5116 751c52cd42065e2c68e761ba9ea058ce.exe -
Processes:
resource yara_rule behavioral2/memory/2468-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\751c52cd42065e2c68e761ba9ea058ce.exe upx behavioral2/memory/5116-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
751c52cd42065e2c68e761ba9ea058ce.exepid process 2468 751c52cd42065e2c68e761ba9ea058ce.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
751c52cd42065e2c68e761ba9ea058ce.exe751c52cd42065e2c68e761ba9ea058ce.exepid process 2468 751c52cd42065e2c68e761ba9ea058ce.exe 5116 751c52cd42065e2c68e761ba9ea058ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
751c52cd42065e2c68e761ba9ea058ce.exedescription pid process target process PID 2468 wrote to memory of 5116 2468 751c52cd42065e2c68e761ba9ea058ce.exe 751c52cd42065e2c68e761ba9ea058ce.exe PID 2468 wrote to memory of 5116 2468 751c52cd42065e2c68e761ba9ea058ce.exe 751c52cd42065e2c68e761ba9ea058ce.exe PID 2468 wrote to memory of 5116 2468 751c52cd42065e2c68e761ba9ea058ce.exe 751c52cd42065e2c68e761ba9ea058ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\751c52cd42065e2c68e761ba9ea058ce.exe"C:\Users\Admin\AppData\Local\Temp\751c52cd42065e2c68e761ba9ea058ce.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\751c52cd42065e2c68e761ba9ea058ce.exeC:\Users\Admin\AppData\Local\Temp\751c52cd42065e2c68e761ba9ea058ce.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55da062de31e7964ba2ca210b0346364a
SHA1c153f3b4e287b7e08d2df633be9d748118048645
SHA25688ab0085708feee911cac7aff3e1542fc59d3eedf2ea4af7027ae57da47e5a2c
SHA512938c3269b4b792c85d477899d62d742aed53687ef4eedcd414d7e686abfcebcf86428e736fb3a62a6400159d70448e332ae82cab9d7d593818dec0984e28e87f