Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 21:01
Behavioral task
behavioral1
Sample
7dfde1a349b1f334d702eb08233dc7ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7dfde1a349b1f334d702eb08233dc7ea.exe
Resource
win10v2004-20231215-en
General
-
Target
7dfde1a349b1f334d702eb08233dc7ea.exe
-
Size
2.4MB
-
MD5
7dfde1a349b1f334d702eb08233dc7ea
-
SHA1
6e414b098e35aca6161950a979ce339e40b58aa9
-
SHA256
acf54fd9d405e47248bd77b21203d27db254518fa07ef68955d44942340c48de
-
SHA512
21c320afa3c505c96bbf35eddf7d2fc25d5ae521bd93be8ce4526fd3363371327a0a8c674e8501c8bce2a34120ed3a103db20047fa8ac2f15898331dbed6ffb7
-
SSDEEP
49152:z+kNQP15vOJgmZs6Yjk1bDJH9P4M338dB2IBlGuuDVUsdxxjr:6k+vmpZsR0bd9gg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3432 7dfde1a349b1f334d702eb08233dc7ea.exe -
Executes dropped EXE 1 IoCs
pid Process 3432 7dfde1a349b1f334d702eb08233dc7ea.exe -
resource yara_rule behavioral2/memory/3920-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000023170-11.dat upx behavioral2/memory/3432-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3920 7dfde1a349b1f334d702eb08233dc7ea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3920 7dfde1a349b1f334d702eb08233dc7ea.exe 3432 7dfde1a349b1f334d702eb08233dc7ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3432 3920 7dfde1a349b1f334d702eb08233dc7ea.exe 86 PID 3920 wrote to memory of 3432 3920 7dfde1a349b1f334d702eb08233dc7ea.exe 86 PID 3920 wrote to memory of 3432 3920 7dfde1a349b1f334d702eb08233dc7ea.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dfde1a349b1f334d702eb08233dc7ea.exe"C:\Users\Admin\AppData\Local\Temp\7dfde1a349b1f334d702eb08233dc7ea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\7dfde1a349b1f334d702eb08233dc7ea.exeC:\Users\Admin\AppData\Local\Temp\7dfde1a349b1f334d702eb08233dc7ea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56d763ddd4a5c63a32c458d4b9ae16091
SHA1090adfb3d60c615c296851b334844884fe1f39d4
SHA25672d2eda37e07a4dff323b755d18b0075ed924678b0041a347beb552a16698b69
SHA5129e599ed44add5b136babc2613f35ccb8956e766bcdda08ea68b0841d47e50d491f5e2f2514866a490dbd93ac2eaa1ea7648e559c49647a03030fcd349464cd06