Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:25
Behavioral task
behavioral1
Sample
75162acd3500bbf916f427927dc21b33.exe
Resource
win7-20231129-en
General
-
Target
75162acd3500bbf916f427927dc21b33.exe
-
Size
2.9MB
-
MD5
75162acd3500bbf916f427927dc21b33
-
SHA1
657dc4e1b8eceba7c254edfe5c76a702a05a3eae
-
SHA256
dc2843dc3529f43324be0b38e979942942a77069473b6a3ddefb0e5be1d267ae
-
SHA512
32e65816e93f7ed08b935fbcbe53fb4ebda957038319008f6018aadbcf01ec813877f806965c732624ee2988c43c4e66980c675733494496135a386dde08987a
-
SSDEEP
49152:pruzZm03Dw3sRCgjq/FuapgWHz8kQ239t/rP4M338dB2IBlGuuDVUsdxxjeQZwxs:p2Q03888gW/FXpR5Rgg3gnl/IVUs1jek
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 75162acd3500bbf916f427927dc21b33.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 75162acd3500bbf916f427927dc21b33.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 75162acd3500bbf916f427927dc21b33.exe -
resource yara_rule behavioral1/memory/2468-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000d0000000122a8-10.dat upx behavioral1/files/0x000d0000000122a8-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2468 75162acd3500bbf916f427927dc21b33.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2468 75162acd3500bbf916f427927dc21b33.exe 2196 75162acd3500bbf916f427927dc21b33.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2196 2468 75162acd3500bbf916f427927dc21b33.exe 28 PID 2468 wrote to memory of 2196 2468 75162acd3500bbf916f427927dc21b33.exe 28 PID 2468 wrote to memory of 2196 2468 75162acd3500bbf916f427927dc21b33.exe 28 PID 2468 wrote to memory of 2196 2468 75162acd3500bbf916f427927dc21b33.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75162acd3500bbf916f427927dc21b33.exe"C:\Users\Admin\AppData\Local\Temp\75162acd3500bbf916f427927dc21b33.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\75162acd3500bbf916f427927dc21b33.exeC:\Users\Admin\AppData\Local\Temp\75162acd3500bbf916f427927dc21b33.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD528bdb08bc1500ce6e5165f6ad06ae8e6
SHA1534d7ba27916bb97f4e4033afe65ade8744bed23
SHA256f3a7ea001ef9caa6dc6e993ea0370ca252096e3ecacef2a5652a2d0ef05a0a2d
SHA512980dddfb62abc189e22c25e6e03c7ffcf4f8d45ff2185e84133aaf34e9e0d4b37605e82dc524c88b434acee8323e5794d2ef37641e38e629cc36ce98d2da369f
-
Filesize
419KB
MD5dd1e3dee1c2d0b9eb308884400de1705
SHA1b07b09b4148dc06f653087d89338bced97b431ad
SHA25631b50f588d536e4b419c39407e7bc796c77230a0fe59825eda1d9bdfc5ad2854
SHA512cb288ccc9a25e48b21e8db21ed3d8fe2de428fa0b12f8e96da42f45782d01da5b61714122b2358ca7810e6e8b859972c1f417aa0151f5fa94507b16b9e934913