Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 16:54
Behavioral task
behavioral1
Sample
7d819eadd312e53d6cc36637faaba616.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d819eadd312e53d6cc36637faaba616.exe
Resource
win10v2004-20231222-en
General
-
Target
7d819eadd312e53d6cc36637faaba616.exe
-
Size
5.8MB
-
MD5
7d819eadd312e53d6cc36637faaba616
-
SHA1
e5a799d4735a98f786f64173b5c60ec1ca3288e8
-
SHA256
3037c0ac271c330b812bc1e3d39ab62a009f8c266bad6c550fb48db2a7b4be76
-
SHA512
7ca44818f158a0e2744b82fd05a22fea6bc98dc2d1348c184077b1867cd83128059ef8fd08ff15d8d5faa8831876021426563c29f50eb4f00c55c1c7955d9592
-
SSDEEP
98304:Ywb4dKodXvlGb+oW6+ELyNS/i0+4M7U3cmv5rAdXvlGb+oW6+ELyNS:RbSPXvQKTyyNUiDw3cmv54XvQKTyyN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2000 7d819eadd312e53d6cc36637faaba616.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 7d819eadd312e53d6cc36637faaba616.exe -
resource yara_rule behavioral2/memory/396-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000231ea-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 396 7d819eadd312e53d6cc36637faaba616.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 396 7d819eadd312e53d6cc36637faaba616.exe 2000 7d819eadd312e53d6cc36637faaba616.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 2000 396 7d819eadd312e53d6cc36637faaba616.exe 85 PID 396 wrote to memory of 2000 396 7d819eadd312e53d6cc36637faaba616.exe 85 PID 396 wrote to memory of 2000 396 7d819eadd312e53d6cc36637faaba616.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d819eadd312e53d6cc36637faaba616.exe"C:\Users\Admin\AppData\Local\Temp\7d819eadd312e53d6cc36637faaba616.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\7d819eadd312e53d6cc36637faaba616.exeC:\Users\Admin\AppData\Local\Temp\7d819eadd312e53d6cc36637faaba616.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2000
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5739e0fc3e6534b77e7bea35cbf7c593c
SHA1dafb0426e03db9c62c5b236b18749db670d88fe3
SHA2561d1769cf4cafc776d40dae91d7c56d1006de78b4d5a26beba4edd299e8ab89b8
SHA5123319da5d537953711ef3e86dcd3d943182ae7c7c393a6408491e27dc20bcfa743b73f3fcc21e6afd277b4194dbb5aae55d1b7eadcda8dad5d118c9ef0fc96ebf