Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
8ca7ae67139eebc014e7a425b1a7b9a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca7ae67139eebc014e7a425b1a7b9a1.exe
Resource
win10v2004-20231222-en
General
-
Target
8ca7ae67139eebc014e7a425b1a7b9a1.exe
-
Size
82KB
-
MD5
8ca7ae67139eebc014e7a425b1a7b9a1
-
SHA1
2ef5179e383faa551cddc69f8aec355ff2c76f92
-
SHA256
b815bc8e56b3c307214eee06f4d3c19d7d900a735afcd3e7abbb2b5212f97c97
-
SHA512
c1a63066fd15a9bb7400de2f0e2370d2c14c56ceec5f5f55098d4af62b6d972bd1f35fdbf4265899ab25dd7ab7e671f843316ae1f09f9403630f69c1e7ea8927
-
SSDEEP
1536:zDIgNBiQr2P+M5skqkEdEGwjQW/kNrnynvKfAGNA8A75jTsMPigQNvQ0h2:LN++MZqAGw8eQcvKfDNNM5j4MPsno
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1584 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Executes dropped EXE 1 IoCs
pid Process 1584 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3248 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3248 8ca7ae67139eebc014e7a425b1a7b9a1.exe 1584 8ca7ae67139eebc014e7a425b1a7b9a1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 1584 3248 8ca7ae67139eebc014e7a425b1a7b9a1.exe 86 PID 3248 wrote to memory of 1584 3248 8ca7ae67139eebc014e7a425b1a7b9a1.exe 86 PID 3248 wrote to memory of 1584 3248 8ca7ae67139eebc014e7a425b1a7b9a1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe"C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exeC:\Users\Admin\AppData\Local\Temp\8ca7ae67139eebc014e7a425b1a7b9a1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD52b213d2728d127f26ecc1b2be23560a9
SHA174516d0bda570df983c64975309e20802dd9d52e
SHA256ec7fd8ed711071fd55fa7684a2a0d63f074870502e01b3ec69b1b93e4430e191
SHA512e7a0eb0ed13fb82f5e2d034f0412828b989b6e2eab1fa153f64011f4a37b9c35d451ad1755319c786af65ec5a88c3aa1c3e3b3ee2fd7cc4a2d0df7e200bcfa66