Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 01:24
Behavioral task
behavioral1
Sample
760502ae64652fa1629c5414506d89ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
760502ae64652fa1629c5414506d89ff.exe
Resource
win10v2004-20231222-en
General
-
Target
760502ae64652fa1629c5414506d89ff.exe
-
Size
2.7MB
-
MD5
760502ae64652fa1629c5414506d89ff
-
SHA1
0e4063d8e49bdf1252f067552012a9c893cecd30
-
SHA256
b14b0fa455f520380236f76318dcfbcebfc422700559e9e6a4d224eec82eec17
-
SHA512
3b00899b16dff3f78dc45420ee6dcd3f2ec769ca29c6bf89dbbbe59b78e93521372a458f64bbebccb01e6ab7ed5eaeb6195f0bb586f348cc0250343d4c2e720e
-
SSDEEP
49152:QGZ8EBPPLlek1JU8CyuTrc6PIqUW1OJHxcWTG5u5MaLd4kg:QmzdzYkYx5PzUJRcWa5V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4940 760502ae64652fa1629c5414506d89ff.exe -
Executes dropped EXE 1 IoCs
pid Process 4940 760502ae64652fa1629c5414506d89ff.exe -
resource yara_rule behavioral2/memory/3832-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/4940-14-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000a00000002312d-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3832 760502ae64652fa1629c5414506d89ff.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3832 760502ae64652fa1629c5414506d89ff.exe 4940 760502ae64652fa1629c5414506d89ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 4940 3832 760502ae64652fa1629c5414506d89ff.exe 88 PID 3832 wrote to memory of 4940 3832 760502ae64652fa1629c5414506d89ff.exe 88 PID 3832 wrote to memory of 4940 3832 760502ae64652fa1629c5414506d89ff.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\760502ae64652fa1629c5414506d89ff.exe"C:\Users\Admin\AppData\Local\Temp\760502ae64652fa1629c5414506d89ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\760502ae64652fa1629c5414506d89ff.exeC:\Users\Admin\AppData\Local\Temp\760502ae64652fa1629c5414506d89ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5efdba7ba6099a813cefa57b6634d79cb
SHA14b2c76e25bf62292027620b25844864e9328c352
SHA25674ec642865acc72d8fedfca9c7a42be5cfa88901dab4fcd2dc72954d56b332e4
SHA512a56a8fb7ea6dfefd20b458124d93b9c9b2447c18165d397b245995b3fbf29f1e1d4436b2b67b16a60f283f4437740ab23d9e7b6082b5d25ee036612be171afb2