Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 05:01
Behavioral task
behavioral1
Sample
7c388427a7380c1e2d9666aa4719bbb3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c388427a7380c1e2d9666aa4719bbb3.exe
Resource
win10v2004-20231215-en
General
-
Target
7c388427a7380c1e2d9666aa4719bbb3.exe
-
Size
1.3MB
-
MD5
7c388427a7380c1e2d9666aa4719bbb3
-
SHA1
da0a22f33c162fba7af22edcba67e6fa2d0d18cf
-
SHA256
ad51e9a5290e9467c80ef646cafd6816d29a10ad8be994650f1a2d0fa4d1d1fd
-
SHA512
bf50cd93e87c115e75b3bedeee39b1b3f3db39bae7f4fae7629c0d9fb278d41c1a20e0a08c46930487dc53609b7653701dc4233a1571b8b2c79985b4bdf611bc
-
SSDEEP
24576:KuEi+T9syqHXnOzhWW++7zc5RZET0qzo4hL0nR7TfPLOIRWc:fE3OvegWD45RZETU4URD5p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1268 7c388427a7380c1e2d9666aa4719bbb3.exe -
Executes dropped EXE 1 IoCs
pid Process 1268 7c388427a7380c1e2d9666aa4719bbb3.exe -
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00090000000231e3-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4988 7c388427a7380c1e2d9666aa4719bbb3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4988 7c388427a7380c1e2d9666aa4719bbb3.exe 1268 7c388427a7380c1e2d9666aa4719bbb3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1268 4988 7c388427a7380c1e2d9666aa4719bbb3.exe 52 PID 4988 wrote to memory of 1268 4988 7c388427a7380c1e2d9666aa4719bbb3.exe 52 PID 4988 wrote to memory of 1268 4988 7c388427a7380c1e2d9666aa4719bbb3.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c388427a7380c1e2d9666aa4719bbb3.exe"C:\Users\Admin\AppData\Local\Temp\7c388427a7380c1e2d9666aa4719bbb3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\7c388427a7380c1e2d9666aa4719bbb3.exeC:\Users\Admin\AppData\Local\Temp\7c388427a7380c1e2d9666aa4719bbb3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD545955ca535e0ceb4a22f2e949c021642
SHA1deae3b2545b7bb3c7d3047990093cd8a27ef2ab3
SHA25603a7ff501ad17363fb15823fed7a666a2b6dc821f2ef7ff499f9e0c96297df46
SHA512b032bfa7ec08fd2c64b60f3782b90693290a2299d8760099f1bf81471672d0a769a5d153bb0388865fcde3f0065a23138693daa7ab3ade8205fbf361a073979b