Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 04:33
Behavioral task
behavioral1
Sample
76650b353d0580bbfd603c9bb2114332.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76650b353d0580bbfd603c9bb2114332.exe
Resource
win10v2004-20231215-en
General
-
Target
76650b353d0580bbfd603c9bb2114332.exe
-
Size
2.7MB
-
MD5
76650b353d0580bbfd603c9bb2114332
-
SHA1
61cc0503f56fb288cf9247e3099c69d5cb7cbd50
-
SHA256
31cd0013ba9c690cd6b8aa2932febdd5cfa2730230b7f02194f108a6f231716b
-
SHA512
c10293e813dd59bd399f748c7e553664140cdeed0ca0381717901b8ef30d31d9d02e314fb2ab2040a6a6293eaca02c3f98fae47ee00c4c6e289c47e7980e48e9
-
SSDEEP
49152:J/7dbg3R6vljIy4siTzKBAztN10f8gzJ7agmdDT1ZgUbFYUWrMAYoR6RWrP2y/XK:J/7d5LiCBAzNW8gzJ+TdD59bFYEnoR65
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 76650b353d0580bbfd603c9bb2114332.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 76650b353d0580bbfd603c9bb2114332.exe -
resource yara_rule behavioral2/memory/5036-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023207-11.dat upx behavioral2/memory/4584-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5036 76650b353d0580bbfd603c9bb2114332.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5036 76650b353d0580bbfd603c9bb2114332.exe 4584 76650b353d0580bbfd603c9bb2114332.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4584 5036 76650b353d0580bbfd603c9bb2114332.exe 54 PID 5036 wrote to memory of 4584 5036 76650b353d0580bbfd603c9bb2114332.exe 54 PID 5036 wrote to memory of 4584 5036 76650b353d0580bbfd603c9bb2114332.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\76650b353d0580bbfd603c9bb2114332.exe"C:\Users\Admin\AppData\Local\Temp\76650b353d0580bbfd603c9bb2114332.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\76650b353d0580bbfd603c9bb2114332.exeC:\Users\Admin\AppData\Local\Temp\76650b353d0580bbfd603c9bb2114332.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD5acfc978801a41b277cf9f49537a98e6b
SHA1cd2d5ccd2cba5e4b09792d61fe8b6508e600ec40
SHA2561ab1a24eb2342090864ccad7f52c8215707ee7bbd0cabc5d0edb4590ab93ee29
SHA51201fc49a45ae58b855a9d897f531b458cf99f8e663ead2c84d9e6e8b9cd9f55fde8d165fac4e229e68972059fd90da178bbded179477ed15ed671b68fd36a78c5