Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
80424b84ae1571d82da392795e1b13e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
80424b84ae1571d82da392795e1b13e1.exe
Resource
win10v2004-20231215-en
General
-
Target
80424b84ae1571d82da392795e1b13e1.exe
-
Size
82KB
-
MD5
80424b84ae1571d82da392795e1b13e1
-
SHA1
33665c0c1c4c93bd6ee5396ad72dee52fd62c100
-
SHA256
5f57f0dd1dd47c96023dda923bf0550652acc427b042fe3f11e72fd89063bf52
-
SHA512
73de96cb180816010c7bfbdef9aa6f21f7f57f260f4439bf7f3b5b958cf24dcdae892671e0c3fa52b367fb14bd70821ffd9130b36372487708de0e8d52b3793e
-
SSDEEP
1536:vulyn0k1+12TuZSR9Wwwbb0J1qlFQowf/b4UMvdaD72Hp7zqSKv7nTz:IilocQbEWQowf/MUSdo7a7zqSKDn3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5008 80424b84ae1571d82da392795e1b13e1.exe -
Executes dropped EXE 1 IoCs
pid Process 5008 80424b84ae1571d82da392795e1b13e1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 80424b84ae1571d82da392795e1b13e1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 80424b84ae1571d82da392795e1b13e1.exe 5008 80424b84ae1571d82da392795e1b13e1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 5008 1968 80424b84ae1571d82da392795e1b13e1.exe 87 PID 1968 wrote to memory of 5008 1968 80424b84ae1571d82da392795e1b13e1.exe 87 PID 1968 wrote to memory of 5008 1968 80424b84ae1571d82da392795e1b13e1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\80424b84ae1571d82da392795e1b13e1.exe"C:\Users\Admin\AppData\Local\Temp\80424b84ae1571d82da392795e1b13e1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\80424b84ae1571d82da392795e1b13e1.exeC:\Users\Admin\AppData\Local\Temp\80424b84ae1571d82da392795e1b13e1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b7df7c9066c8ca8eed305393976a2f8e
SHA1fb573c9499c61058cdfa0a74b519b2e354add1ff
SHA256d89268600b142a434f5dac42f489b2d7b63aa1b183e0a8e4c37ebc0e0c254fb5
SHA5123a34dbcc3899e1d5acd7424dc37c2e6aa4e53551c32a8022a030375b77592024217598d10c59fa33230fc8c7e267707dd90f6ec2cf099c1e7282cb028106b0ad