Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:44
Behavioral task
behavioral1
Sample
7520300cb3727b7a4a3576dcf611d52b.exe
Resource
win7-20231215-en
General
-
Target
7520300cb3727b7a4a3576dcf611d52b.exe
-
Size
1.3MB
-
MD5
7520300cb3727b7a4a3576dcf611d52b
-
SHA1
5b34cc94b619be6b06a300011338df8f323d98c0
-
SHA256
6cc955a94103a3a92f1ca35a717a24edf2e08d0b6a6352f63e45aa786d8990b1
-
SHA512
5999c5ddcc925f6be81374aefd919c3c878c70611ebf1b22049f070ec80690489a94848742577aeee83861fe80e5ff1b17f61e14ad1b418a35a891498bc854c7
-
SSDEEP
24576:bLQ425dc0mCrvS1Jt9hP9NtpiCZG+dOfDZY/Ep/xFKBv0Zn218U9/9Us:nQNuCTSTP9fU+dOrS/ER1ZnsR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3208 7520300cb3727b7a4a3576dcf611d52b.exe -
Executes dropped EXE 1 IoCs
pid Process 3208 7520300cb3727b7a4a3576dcf611d52b.exe -
resource yara_rule behavioral2/memory/1448-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000700000002324d-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1448 7520300cb3727b7a4a3576dcf611d52b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1448 7520300cb3727b7a4a3576dcf611d52b.exe 3208 7520300cb3727b7a4a3576dcf611d52b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3208 1448 7520300cb3727b7a4a3576dcf611d52b.exe 25 PID 1448 wrote to memory of 3208 1448 7520300cb3727b7a4a3576dcf611d52b.exe 25 PID 1448 wrote to memory of 3208 1448 7520300cb3727b7a4a3576dcf611d52b.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\7520300cb3727b7a4a3576dcf611d52b.exe"C:\Users\Admin\AppData\Local\Temp\7520300cb3727b7a4a3576dcf611d52b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\7520300cb3727b7a4a3576dcf611d52b.exeC:\Users\Admin\AppData\Local\Temp\7520300cb3727b7a4a3576dcf611d52b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d56afb40c92f1529be0d481ff807f4cd
SHA1cd9a39eb2a68006731f5d452e8e2118053cc7e51
SHA256c5c4c84195d2f6386165347aa698b720f832f8dd9d0db390040e7848c18f4e15
SHA512ab78d6fe59999b292d490a89a4974d718277a5727ce2a99cea3532655a0195cd953c30f0fe6429ccc3f226cf21b777dcd89c2ee481a8d5172f6e6fdb496be92d