Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
8cb760d3d8800ee106499f9b4e5ff3ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cb760d3d8800ee106499f9b4e5ff3ea.exe
Resource
win10v2004-20231215-en
General
-
Target
8cb760d3d8800ee106499f9b4e5ff3ea.exe
-
Size
57KB
-
MD5
8cb760d3d8800ee106499f9b4e5ff3ea
-
SHA1
400b66fca63200fcac5417cadfc226c3a5d25eec
-
SHA256
26515ca83cd19f22789667f12bc713728e9ea503267cbc9302b3ca5b383a8840
-
SHA512
787969f61a5739aceaee65cd98941704ae78a4030c9546cbd3c65640b5f7a8caad081d1dcacb4ecf01190849cc4196eb7b6a07939719159d67ec968b3a83b6b8
-
SSDEEP
1536:+XQzQTYjmQZfswZ/Psvsu1rrecuHipzKyBfP2B:XkOrfPETnTpzJP2B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 8cb760d3d8800ee106499f9b4e5ff3ea.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 8cb760d3d8800ee106499f9b4e5ff3ea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 8cb760d3d8800ee106499f9b4e5ff3ea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2900 8cb760d3d8800ee106499f9b4e5ff3ea.exe 2304 8cb760d3d8800ee106499f9b4e5ff3ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2304 2900 8cb760d3d8800ee106499f9b4e5ff3ea.exe 86 PID 2900 wrote to memory of 2304 2900 8cb760d3d8800ee106499f9b4e5ff3ea.exe 86 PID 2900 wrote to memory of 2304 2900 8cb760d3d8800ee106499f9b4e5ff3ea.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb760d3d8800ee106499f9b4e5ff3ea.exe"C:\Users\Admin\AppData\Local\Temp\8cb760d3d8800ee106499f9b4e5ff3ea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\8cb760d3d8800ee106499f9b4e5ff3ea.exeC:\Users\Admin\AppData\Local\Temp\8cb760d3d8800ee106499f9b4e5ff3ea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD58cb2358587de955f1301883be434cdbf
SHA190313010aec5e04bdcb9b632e294610f9a1fa688
SHA256068fb068bd3fe589e7297a5d8e70dcbc7ac9e19653e2e88cdd2b389910697520
SHA5122dfd95ffdd7f8764f42da5dd95a806538d8bdc6720070b30e89bee30891349e1ea4d79e256793482b53ec333189ad0c9d8560844533d2149961000d5c271ebbd