Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 22:17
Behavioral task
behavioral1
Sample
78879c1b563464678d1d44313b067a83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78879c1b563464678d1d44313b067a83.exe
Resource
win10v2004-20231215-en
General
-
Target
78879c1b563464678d1d44313b067a83.exe
-
Size
56KB
-
MD5
78879c1b563464678d1d44313b067a83
-
SHA1
e3d196d56e7473f32b584840ed69386f68437e3c
-
SHA256
e4ce3f8124297828c263681abbd75c218a2e226d43c806ac9c2fdf696f0a0eed
-
SHA512
53b9c548fca27422967144cf1df466ab757ce817827be10a055cea1c31dcfe06c30662872ff3f16937135bd3853d153a2f3de20ffa3976facd42165e90dec55f
-
SSDEEP
1536:7O7Icu3cIWEao8NXGgMvU8/oH+tzytAQ+Ali5D:aJscIWXNWgMr/FwAL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 78879c1b563464678d1d44313b067a83.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 78879c1b563464678d1d44313b067a83.exe -
Loads dropped DLL 1 IoCs
pid Process 1936 78879c1b563464678d1d44313b067a83.exe -
resource yara_rule behavioral1/memory/1936-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x000b00000001224d-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1936 78879c1b563464678d1d44313b067a83.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1936 78879c1b563464678d1d44313b067a83.exe 2660 78879c1b563464678d1d44313b067a83.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2660 1936 78879c1b563464678d1d44313b067a83.exe 29 PID 1936 wrote to memory of 2660 1936 78879c1b563464678d1d44313b067a83.exe 29 PID 1936 wrote to memory of 2660 1936 78879c1b563464678d1d44313b067a83.exe 29 PID 1936 wrote to memory of 2660 1936 78879c1b563464678d1d44313b067a83.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\78879c1b563464678d1d44313b067a83.exe"C:\Users\Admin\AppData\Local\Temp\78879c1b563464678d1d44313b067a83.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\78879c1b563464678d1d44313b067a83.exeC:\Users\Admin\AppData\Local\Temp\78879c1b563464678d1d44313b067a83.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5722ab4cf7a9199cdcd6651764f76a3fb
SHA17a3757242b3107fbc94cd6f8a1ce23cf2ae2fc7c
SHA256b8b1381f68064b111ab8e1067f34fa085295e75f346446147c722237b6ecea00
SHA512a7bafa6e4d88a472fabec6ed7ac4d687ad79151a50d8f6a35065c8e49d95c01bcebf08247c16fddc15af0e01862debb5b9109ac181652a79f2215bb69a9c12cd