Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
7dcd26623bee10a9de849c4afc33b6cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7dcd26623bee10a9de849c4afc33b6cb.exe
Resource
win10v2004-20231222-en
General
-
Target
7dcd26623bee10a9de849c4afc33b6cb.exe
-
Size
82KB
-
MD5
7dcd26623bee10a9de849c4afc33b6cb
-
SHA1
e3a69d6a09fdb69953fd0b97a0753d4ef6fd8aec
-
SHA256
e083ee90b2c70a917b256a11f06b8583c951b2634a4fd7e16d82986f13e6dab7
-
SHA512
d1353f66a631969abfd7e7de2349cd5ebd62e50795a408790b07511b0f75123d3afd4102a6e5c7cfc11bdb3e36176f4b5071a5eb1f4c47a5a1084a744956e854
-
SSDEEP
1536:d9XGvQPVLQ7OjSzt5Rb20QPaI6/SjShCNApBWAJnwiD4Lw7XRK:fXGYPV0SjSJ5RitaX/Szk0AJnwUDU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 7dcd26623bee10a9de849c4afc33b6cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4952 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4952 7dcd26623bee10a9de849c4afc33b6cb.exe 2420 7dcd26623bee10a9de849c4afc33b6cb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2420 4952 7dcd26623bee10a9de849c4afc33b6cb.exe 86 PID 4952 wrote to memory of 2420 4952 7dcd26623bee10a9de849c4afc33b6cb.exe 86 PID 4952 wrote to memory of 2420 4952 7dcd26623bee10a9de849c4afc33b6cb.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe"C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exeC:\Users\Admin\AppData\Local\Temp\7dcd26623bee10a9de849c4afc33b6cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5af6884706cb747b38fd746cf1632a236
SHA1262ae185060d21e1551363888175d6adb0a9eb75
SHA256bbb2bcb367d445abbace2bd649f94e35c01ef2437f7dc71a33f08b8e5e57384c
SHA512912e36bd90e88f6ff48d6b30ae8f326aa234c3951bc7f6352e44bbe67e68e9c869907e03ab86d223744653cd5f542798d8474cffa4a50921fba3a60b94e68fdb