Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
8d89c896814ee01afe068629d39116f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d89c896814ee01afe068629d39116f3.exe
Resource
win10v2004-20231215-en
General
-
Target
8d89c896814ee01afe068629d39116f3.exe
-
Size
82KB
-
MD5
8d89c896814ee01afe068629d39116f3
-
SHA1
249cfebcea01f9b7cb8b778959a472d8e0e9ec9c
-
SHA256
50d3e2771e6a88ede8106251061a11452d718ce20d94203119a85e848c64026a
-
SHA512
6fc50c2c8c086c36df4bdb7b676285c8d99fb58482d26fe407e7ff560195caac6213ed6f96a497866f0fbcfc9242183ddc4406a509ced36e67036bf8c6c7cdcc
-
SSDEEP
1536:LbIl5We2UNcMzMZFTVfotCyizTiuuLmiuqCJa9Ilf8xRC/xKPFaBemM1+1tVBITh:LM7njhY/1pquuLmiuNJaKkyoP8Bemw+E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3844 8d89c896814ee01afe068629d39116f3.exe -
Executes dropped EXE 1 IoCs
pid Process 3844 8d89c896814ee01afe068629d39116f3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3668 8d89c896814ee01afe068629d39116f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3668 8d89c896814ee01afe068629d39116f3.exe 3844 8d89c896814ee01afe068629d39116f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3844 3668 8d89c896814ee01afe068629d39116f3.exe 85 PID 3668 wrote to memory of 3844 3668 8d89c896814ee01afe068629d39116f3.exe 85 PID 3668 wrote to memory of 3844 3668 8d89c896814ee01afe068629d39116f3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe"C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exeC:\Users\Admin\AppData\Local\Temp\8d89c896814ee01afe068629d39116f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD53c440a41cb70f9a7d48a6966e89e55f3
SHA1f65127b8e34b12653f16774806f96d0e09912934
SHA256763dee3bb31204bb1dd49f228aa5bd0db14d0fb2898bbe2da5d1d86419eb1ae9
SHA512958ee847c4ef8626c850ce1a3f07b11426d93450ef387e476ce82286ccef78e5d3d93e941e421220a037438c488e389669d041e9981bc0e11c7b3c3658419795