Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:47
Behavioral task
behavioral1
Sample
75214418c602052280a7fd4373d53091.exe
Resource
win7-20231215-en
General
-
Target
75214418c602052280a7fd4373d53091.exe
-
Size
1.3MB
-
MD5
75214418c602052280a7fd4373d53091
-
SHA1
0000e3e02778e2bd0a1eee340977f67a395146be
-
SHA256
f867f05176f145e7898ae6c3adcc2814402a7352721902f80daacf834e40599b
-
SHA512
002a7adf3c34f0cadb8eb37dcdb18222e3f19be2ebcc34346ca8e22cd49e6cb759bdd47b96eb8f5c9a2f6c6b564be920b95ffa9890c6e0e6b7adfb8b0375da12
-
SSDEEP
24576:reVyXJfAT9wYNRamd/yNfo+MsEZSxMI1T4/pzemhn7tPOvG:r1JfC9wuRamEu+dEoxT4/f5tP
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
75214418c602052280a7fd4373d53091.exepid process 3044 75214418c602052280a7fd4373d53091.exe -
Executes dropped EXE 1 IoCs
Processes:
75214418c602052280a7fd4373d53091.exepid process 3044 75214418c602052280a7fd4373d53091.exe -
Loads dropped DLL 1 IoCs
Processes:
75214418c602052280a7fd4373d53091.exepid process 3020 75214418c602052280a7fd4373d53091.exe -
Processes:
resource yara_rule behavioral1/memory/3020-0-0x0000000000400000-0x000000000086A000-memory.dmp upx \Users\Admin\AppData\Local\Temp\75214418c602052280a7fd4373d53091.exe upx -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
75214418c602052280a7fd4373d53091.exepid process 3020 75214418c602052280a7fd4373d53091.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
75214418c602052280a7fd4373d53091.exe75214418c602052280a7fd4373d53091.exepid process 3020 75214418c602052280a7fd4373d53091.exe 3044 75214418c602052280a7fd4373d53091.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
75214418c602052280a7fd4373d53091.exedescription pid process target process PID 3020 wrote to memory of 3044 3020 75214418c602052280a7fd4373d53091.exe 75214418c602052280a7fd4373d53091.exe PID 3020 wrote to memory of 3044 3020 75214418c602052280a7fd4373d53091.exe 75214418c602052280a7fd4373d53091.exe PID 3020 wrote to memory of 3044 3020 75214418c602052280a7fd4373d53091.exe 75214418c602052280a7fd4373d53091.exe PID 3020 wrote to memory of 3044 3020 75214418c602052280a7fd4373d53091.exe 75214418c602052280a7fd4373d53091.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75214418c602052280a7fd4373d53091.exe"C:\Users\Admin\AppData\Local\Temp\75214418c602052280a7fd4373d53091.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\75214418c602052280a7fd4373d53091.exeC:\Users\Admin\AppData\Local\Temp\75214418c602052280a7fd4373d53091.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56e7009e3c5d9766794641975cf59274c
SHA165732c359cd5cb3921545aa8d28254a84c4fcd29
SHA2567a727eb186f035a3a35f8f42dd245990188a43df5d0954d9e0a232a61d0da240
SHA512fe0df228032d7cd61d14f7eb7eb61a8384664052cc310fb840982380f0506f4b5f5fbf8ac905ead502fa3b74d664875f764a22b9b921b458884c6714efa07a02