Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
7ec6dc9a4a6c820bffd4e93985c6adc6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ec6dc9a4a6c820bffd4e93985c6adc6.exe
Resource
win10v2004-20231215-en
General
-
Target
7ec6dc9a4a6c820bffd4e93985c6adc6.exe
-
Size
82KB
-
MD5
7ec6dc9a4a6c820bffd4e93985c6adc6
-
SHA1
eb2410d2b05a0a94cdc20801f418b203ccdff37f
-
SHA256
d57f282c446872bb698dc88639f38b7681290b958344d958fbd21e2e8401e402
-
SHA512
6dbaf11d827e8938dd464a9419c8f3b372fa6221d64d631cde16b778838d004d85ea5d2e24eb8ac7297289794243d67f38bab6b228077bf628d480394feab5cd
-
SSDEEP
1536:lbd81JKSE4DaZ6Wb+68aDHg8vse8SktNJmBrwIGA5uh:lbuDaII+6Tz8S0UrwIP2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5044 7ec6dc9a4a6c820bffd4e93985c6adc6.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 7ec6dc9a4a6c820bffd4e93985c6adc6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4080 7ec6dc9a4a6c820bffd4e93985c6adc6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4080 7ec6dc9a4a6c820bffd4e93985c6adc6.exe 5044 7ec6dc9a4a6c820bffd4e93985c6adc6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 5044 4080 7ec6dc9a4a6c820bffd4e93985c6adc6.exe 85 PID 4080 wrote to memory of 5044 4080 7ec6dc9a4a6c820bffd4e93985c6adc6.exe 85 PID 4080 wrote to memory of 5044 4080 7ec6dc9a4a6c820bffd4e93985c6adc6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe"C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exeC:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e07b81e7d9f48ce19a4b15298f935f58
SHA17a5f997f17262c545d5f42baec835de80d35aca2
SHA256ecded885282f10daf3d0280ac0bddc24513a74a2ca4845286878754ac2ce2e41
SHA512b3ed963811fa85657c362bc7991d9e8d9394be6b425afe28c58cf43226efa8f422062e26f424da77f7f96a6d6aa369dd35bade5e9026f687960036b6fd04d24f