Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 03:33

General

  • Target

    7ec6dc9a4a6c820bffd4e93985c6adc6.exe

  • Size

    82KB

  • MD5

    7ec6dc9a4a6c820bffd4e93985c6adc6

  • SHA1

    eb2410d2b05a0a94cdc20801f418b203ccdff37f

  • SHA256

    d57f282c446872bb698dc88639f38b7681290b958344d958fbd21e2e8401e402

  • SHA512

    6dbaf11d827e8938dd464a9419c8f3b372fa6221d64d631cde16b778838d004d85ea5d2e24eb8ac7297289794243d67f38bab6b228077bf628d480394feab5cd

  • SSDEEP

    1536:lbd81JKSE4DaZ6Wb+68aDHg8vse8SktNJmBrwIGA5uh:lbuDaII+6Tz8S0UrwIP2

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe
    "C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe
      C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:5044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ec6dc9a4a6c820bffd4e93985c6adc6.exe

    Filesize

    82KB

    MD5

    e07b81e7d9f48ce19a4b15298f935f58

    SHA1

    7a5f997f17262c545d5f42baec835de80d35aca2

    SHA256

    ecded885282f10daf3d0280ac0bddc24513a74a2ca4845286878754ac2ce2e41

    SHA512

    b3ed963811fa85657c362bc7991d9e8d9394be6b425afe28c58cf43226efa8f422062e26f424da77f7f96a6d6aa369dd35bade5e9026f687960036b6fd04d24f

  • memory/4080-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4080-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/4080-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4080-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/5044-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5044-17-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/5044-21-0x00000000014E0000-0x00000000014FB000-memory.dmp

    Filesize

    108KB

  • memory/5044-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB