Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 04:31
Behavioral task
behavioral1
Sample
85ef1a4070a416b8f9a91be274b41d74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85ef1a4070a416b8f9a91be274b41d74.exe
Resource
win10v2004-20231215-en
General
-
Target
85ef1a4070a416b8f9a91be274b41d74.exe
-
Size
5.3MB
-
MD5
85ef1a4070a416b8f9a91be274b41d74
-
SHA1
15029adfdd10b3fa3b518e6febe2f363e4f169e5
-
SHA256
a737ee5ddf14c73aa85c4ad16be4694ced844957dd1f8b8f590abde96f56f829
-
SHA512
96049f58b17b02ad7f7fda608c922a0432fe179a5e5e68dfc96bf892d8af479690f985a9f98b13fe097fd261e4da2e304ae675898409b9f51e8a723e76daddb4
-
SSDEEP
98304:Ie8jraob7DprXCsYgkH7d8JpmmV91oqzHvVGVf+jY/UvJQc4H7d8JpmmV91oqzHj:ITnao9Gekbd8JYmhtPjs/UvJP4bd8JY+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4520 85ef1a4070a416b8f9a91be274b41d74.exe -
Executes dropped EXE 1 IoCs
pid Process 4520 85ef1a4070a416b8f9a91be274b41d74.exe -
resource yara_rule behavioral2/memory/3056-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x00070000000230fd-11.dat upx behavioral2/memory/4520-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3056 85ef1a4070a416b8f9a91be274b41d74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3056 85ef1a4070a416b8f9a91be274b41d74.exe 4520 85ef1a4070a416b8f9a91be274b41d74.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4520 3056 85ef1a4070a416b8f9a91be274b41d74.exe 83 PID 3056 wrote to memory of 4520 3056 85ef1a4070a416b8f9a91be274b41d74.exe 83 PID 3056 wrote to memory of 4520 3056 85ef1a4070a416b8f9a91be274b41d74.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ef1a4070a416b8f9a91be274b41d74.exe"C:\Users\Admin\AppData\Local\Temp\85ef1a4070a416b8f9a91be274b41d74.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\85ef1a4070a416b8f9a91be274b41d74.exeC:\Users\Admin\AppData\Local\Temp\85ef1a4070a416b8f9a91be274b41d74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5830dfc8438b05e3ab21ae354f1e3764a
SHA100d5b488bacf9d4184edbed9b2253d8d191e1b9f
SHA2564a00c7a78091704358134b93040da6f2dbccfdb4a2cd7f8b8447105638151fbd
SHA51281d85ff0edc3f287270b582179e2fe3932207f470d6678ffce21494b344da5169f2d4c1437537f86fb3c7301b19deb1914ad9c7617c6c5e0961d15dda99a1ee6