Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 04:49
Behavioral task
behavioral1
Sample
7c32c78af125e4e486e99c60ba8545b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c32c78af125e4e486e99c60ba8545b2.exe
Resource
win10v2004-20231215-en
General
-
Target
7c32c78af125e4e486e99c60ba8545b2.exe
-
Size
5.8MB
-
MD5
7c32c78af125e4e486e99c60ba8545b2
-
SHA1
b908248c21a5971766f41b4378b2dd4d1ccc1896
-
SHA256
1c98933aee3d74a70a20cbfcd81857dc9f54b5bdda0fd9d0a4b2d0f44715fc45
-
SHA512
e69029c2900a7f10f728c5fa26a4566485fafa3ab951278cbc0d33117c8d797d51b0bd0f170dc6f1282dcab80eeae6c12e92035f5833fa3061873b81ea8d6733
-
SSDEEP
98304:VTb9xXnk/Sn/Hau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:VTbfaSPauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4928 7c32c78af125e4e486e99c60ba8545b2.exe -
Executes dropped EXE 1 IoCs
pid Process 4928 7c32c78af125e4e486e99c60ba8545b2.exe -
resource yara_rule behavioral2/memory/548-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000f00000002314e-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 548 7c32c78af125e4e486e99c60ba8545b2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 548 7c32c78af125e4e486e99c60ba8545b2.exe 4928 7c32c78af125e4e486e99c60ba8545b2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 4928 548 7c32c78af125e4e486e99c60ba8545b2.exe 86 PID 548 wrote to memory of 4928 548 7c32c78af125e4e486e99c60ba8545b2.exe 86 PID 548 wrote to memory of 4928 548 7c32c78af125e4e486e99c60ba8545b2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe"C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exeC:\Users\Admin\AppData\Local\Temp\7c32c78af125e4e486e99c60ba8545b2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5ec88f4834b4e1a7681e44ef04f79341c
SHA18c6d3e783b7206869b8acd7f926d23c303dc7ef7
SHA25667f0588a5561179622cc1b67146c87bcc71b57129dd9fe1c6128e956677b79b8
SHA5129cc48a01a361abec62c267f5908f23a7aac88fe2df879bdb5c5a65049afaa3c6e5ae87a38fc9dfc91614e63680a91bc7b29abd9e700fbd6fb883f161baa6ec30