Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 05:59
Behavioral task
behavioral1
Sample
7f111792e6702df40a5ab53733e29f9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f111792e6702df40a5ab53733e29f9d.exe
Resource
win10v2004-20231215-en
General
-
Target
7f111792e6702df40a5ab53733e29f9d.exe
-
Size
5.3MB
-
MD5
7f111792e6702df40a5ab53733e29f9d
-
SHA1
064ce9579db2fa79b0d305db2886a6493af7cbda
-
SHA256
1489b23bbd6c625178619170c1d4e7872a9dffd0806a5974977cb6bfb6e98439
-
SHA512
aec8f1bb02a426e86507a9652cd72e70ca3bb0d90b02ee1cbd195ab5fd1c89ea9ece08596cdd286727a417b9b1382bcfc5317c46d86823553b5d759788606c45
-
SSDEEP
98304:Fyt8aNskNMcbQ0m4hl+ev8UFp0nghhuPe/6m01k8l+ev8UFp0:FyHlNHba4TH8USgnT6m01zH8U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4464 7f111792e6702df40a5ab53733e29f9d.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 7f111792e6702df40a5ab53733e29f9d.exe -
resource yara_rule behavioral2/memory/4968-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023116-13.dat upx behavioral2/memory/4464-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4968 7f111792e6702df40a5ab53733e29f9d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4968 7f111792e6702df40a5ab53733e29f9d.exe 4464 7f111792e6702df40a5ab53733e29f9d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4464 4968 7f111792e6702df40a5ab53733e29f9d.exe 84 PID 4968 wrote to memory of 4464 4968 7f111792e6702df40a5ab53733e29f9d.exe 84 PID 4968 wrote to memory of 4464 4968 7f111792e6702df40a5ab53733e29f9d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe"C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exeC:\Users\Admin\AppData\Local\Temp\7f111792e6702df40a5ab53733e29f9d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD50bfd661e7fef627e8d776554fb3e17fc
SHA1a74c7748a25c5cf0c120bc716093898bf2d75259
SHA2568775789eb86f45d817cbfde07719d7cce5c1005fff90f11bfd96d94ad35ccc81
SHA5124cca617ecb39c31da3ae778cfd603cce2589afdfd8a49c44a2817338aa3b9c413a61e42c3c285380a47878ed29fd629fb60e5aef658858635a6cd44ba986d9c7