Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
75802c3c4e4e4aa60b7bd23ce6ba686b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75802c3c4e4e4aa60b7bd23ce6ba686b.exe
Resource
win10v2004-20231215-en
General
-
Target
75802c3c4e4e4aa60b7bd23ce6ba686b.exe
-
Size
105KB
-
MD5
75802c3c4e4e4aa60b7bd23ce6ba686b
-
SHA1
3bb1ef77d3d6eb6c444f9851504284da417bd63e
-
SHA256
61793f3c4f5e7bc77b99c6f2a021806fdd43927175db20f33477ff0a994066bb
-
SHA512
5bac3d2da096ff77f15a6614d9b95e499d835f23279d4937a423a310616ae20c21fdc99df8a5f4263ec9e6d66ab78ecf3f890d232e014523962019f21db7cbca
-
SSDEEP
1536:LYBbbQtakziiNK+SWY+j/d2esjgzqjUDHy24UKezSkGhKziTt6DtW9YH:8AakziizSuFG0Hy2LSxopW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 388 75802c3c4e4e4aa60b7bd23ce6ba686b.exe -
Executes dropped EXE 1 IoCs
pid Process 388 75802c3c4e4e4aa60b7bd23ce6ba686b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 75802c3c4e4e4aa60b7bd23ce6ba686b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 75802c3c4e4e4aa60b7bd23ce6ba686b.exe 388 75802c3c4e4e4aa60b7bd23ce6ba686b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 388 1712 75802c3c4e4e4aa60b7bd23ce6ba686b.exe 87 PID 1712 wrote to memory of 388 1712 75802c3c4e4e4aa60b7bd23ce6ba686b.exe 87 PID 1712 wrote to memory of 388 1712 75802c3c4e4e4aa60b7bd23ce6ba686b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\75802c3c4e4e4aa60b7bd23ce6ba686b.exe"C:\Users\Admin\AppData\Local\Temp\75802c3c4e4e4aa60b7bd23ce6ba686b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\75802c3c4e4e4aa60b7bd23ce6ba686b.exeC:\Users\Admin\AppData\Local\Temp\75802c3c4e4e4aa60b7bd23ce6ba686b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5ca519c4b8a9a3639bdf31b44e8de5649
SHA1425689b10c5bc7f8921a25fc7f9f63727a324214
SHA256905e76ac5b09ee82c0216065c92408f84ddfb9b4c95ca8fbd4a94bb8874f69dc
SHA5120f563a52bb1cb712d986b71efa706df4d8bc08c4829f2b82a49928c03891c4ae0d7018e96aa023b66071f9f5f4dc89da6b0a75c39f46395645e07207ef633d0b