Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
75ea68522ed8ffd2b4c7010f59f6174a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75ea68522ed8ffd2b4c7010f59f6174a.exe
Resource
win10v2004-20231215-en
General
-
Target
75ea68522ed8ffd2b4c7010f59f6174a.exe
-
Size
57KB
-
MD5
75ea68522ed8ffd2b4c7010f59f6174a
-
SHA1
7670a6ce42c18d4cf53638b48fdec40f510b571f
-
SHA256
0709e3253813307184b2f29879c130ecc735f5a8a5eefdde362801f94da54ea3
-
SHA512
a7bd73044aad79bcb48f261740a55f4178e2aad68072689f43ddef0569b991d919af4b6dd2ce4d9233663c1b1e25ec76ea4d66dc79b9eb77f7bf8456e072fcd4
-
SSDEEP
1536:TVRIvAi3pVaS/ZsTK5GWUkJ5CqI0RBZfU:T8BphRsTsGiJ59IcBZfU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5036 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3624 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3624 75ea68522ed8ffd2b4c7010f59f6174a.exe 5036 75ea68522ed8ffd2b4c7010f59f6174a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 5036 3624 75ea68522ed8ffd2b4c7010f59f6174a.exe 88 PID 3624 wrote to memory of 5036 3624 75ea68522ed8ffd2b4c7010f59f6174a.exe 88 PID 3624 wrote to memory of 5036 3624 75ea68522ed8ffd2b4c7010f59f6174a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe"C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exeC:\Users\Admin\AppData\Local\Temp\75ea68522ed8ffd2b4c7010f59f6174a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5d96e577a88f61e3e66cc45411d21bdf5
SHA16b06501b8e37a0e04917261bc850eafc8e39bf70
SHA2562864d526f237a8fd0faae8b8da108bb2d8e326c3706b5e7e1c5b8fe220c49afa
SHA512d0aabe24a930c89d98c0c976384cd63da08188478429797e77630604937664366d796d63222849e9f5ce22b6b406688a1d8724bb90e965ba7a4b3e7ddd0722b9