Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 08:45
Behavioral task
behavioral1
Sample
8671b992da213a51468c3d847faf5d9b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8671b992da213a51468c3d847faf5d9b.exe
Resource
win10v2004-20231215-en
General
-
Target
8671b992da213a51468c3d847faf5d9b.exe
-
Size
353KB
-
MD5
8671b992da213a51468c3d847faf5d9b
-
SHA1
ac236f5552679cfb07c5e52ad32e8ee76058e031
-
SHA256
f1c872d4cbcc5df703d9c83531adf09adc176bbb7b20a6f44d4dc938fa689614
-
SHA512
d3b01b4bae0e8d91c5c83bae3b73c9051630918024bad2fa4495fada2d3c398df129f979f4304d8a0f99de462a93870889094833f3187969c38cbdc6e1221115
-
SSDEEP
6144:9/e1yxwibYgmUO0sQNovhtEHdXveeZe1opHYdxfsLPrPwo+:eewibYFFPvjE9eoYTfmE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 8671b992da213a51468c3d847faf5d9b.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 8671b992da213a51468c3d847faf5d9b.exe -
resource yara_rule behavioral2/memory/3516-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/memory/1216-14-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/files/0x000600000002324d-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3516 8671b992da213a51468c3d847faf5d9b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3516 8671b992da213a51468c3d847faf5d9b.exe 1216 8671b992da213a51468c3d847faf5d9b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3516 wrote to memory of 1216 3516 8671b992da213a51468c3d847faf5d9b.exe 75 PID 3516 wrote to memory of 1216 3516 8671b992da213a51468c3d847faf5d9b.exe 75 PID 3516 wrote to memory of 1216 3516 8671b992da213a51468c3d847faf5d9b.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\8671b992da213a51468c3d847faf5d9b.exe"C:\Users\Admin\AppData\Local\Temp\8671b992da213a51468c3d847faf5d9b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\8671b992da213a51468c3d847faf5d9b.exeC:\Users\Admin\AppData\Local\Temp\8671b992da213a51468c3d847faf5d9b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD551b6b730fd5e7689003c30e89abb15db
SHA1426c6f129884d8da43b779aa0fc762383b5959d5
SHA256e534025efbba6cc39e2d06a997d34f7be610848109b017aa722453690f6ffa29
SHA512a35f2592d6fd67851be72184be5218fc39c0b1ee2cffcafa50272b5a8fb85f1f0addb6bb072a473d8bb926aa04b392af40aa6f9fff5b0d316fb2d390b3fae327