Analysis
-
max time kernel
139s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
7ee8281612953b15a3dfb618e9875ef3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ee8281612953b15a3dfb618e9875ef3.exe
Resource
win10v2004-20231215-en
General
-
Target
7ee8281612953b15a3dfb618e9875ef3.exe
-
Size
82KB
-
MD5
7ee8281612953b15a3dfb618e9875ef3
-
SHA1
74dca9e9f650c77aeb99037a4ee0a437944d8d59
-
SHA256
de8a99cfc8bac5a9267306b59951415f638a381bb5988994dda18671de6f34d0
-
SHA512
94a0a7730ce09b9723a7bef489d4e79d35e939f363bdff446d6e3c291776b6000e7ec2f617b4b3e154c31d9b3a03f45f38450f6dc242b4bb8cd7e6a5380435a4
-
SSDEEP
1536:M8P7cZd2UkHN8ERuxKFq36KdAIURCP0c9qJba5qnhJ/s/7icbj0pfqxS:Mmg6UiN94MFgvIc9c7Lk/0pfqxS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 60 7ee8281612953b15a3dfb618e9875ef3.exe -
Executes dropped EXE 1 IoCs
pid Process 60 7ee8281612953b15a3dfb618e9875ef3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1944 7ee8281612953b15a3dfb618e9875ef3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1944 7ee8281612953b15a3dfb618e9875ef3.exe 60 7ee8281612953b15a3dfb618e9875ef3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 60 1944 7ee8281612953b15a3dfb618e9875ef3.exe 85 PID 1944 wrote to memory of 60 1944 7ee8281612953b15a3dfb618e9875ef3.exe 85 PID 1944 wrote to memory of 60 1944 7ee8281612953b15a3dfb618e9875ef3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee8281612953b15a3dfb618e9875ef3.exe"C:\Users\Admin\AppData\Local\Temp\7ee8281612953b15a3dfb618e9875ef3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\7ee8281612953b15a3dfb618e9875ef3.exeC:\Users\Admin\AppData\Local\Temp\7ee8281612953b15a3dfb618e9875ef3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:60
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD59d0a1fd3fb5499c4cd3af2f27c294a17
SHA1f51b43057ffe484a361faff0af3257d3692010c7
SHA2567ac523254950526c2db015df15bbd716903aa39795e0e3903ee36a981e37d787
SHA51246b0d8bb52eee10e85246055054498d38b2777a78c48690300a8f6a2b0a79172aea794ee4f036289b3a010363a5ac20ccbb3b75ce37fd0b60fe8e68e1471747f