Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
8cf5efeee4beab168dd29a7241c0d6b5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8cf5efeee4beab168dd29a7241c0d6b5.exe
Resource
win10v2004-20231215-en
General
-
Target
8cf5efeee4beab168dd29a7241c0d6b5.exe
-
Size
82KB
-
MD5
8cf5efeee4beab168dd29a7241c0d6b5
-
SHA1
53de2a0b967944d0c5fe3c02b44619619b2f5a80
-
SHA256
02765e34b125ce779412583d7a310ee899c5025a7c16482a73c2cca6347e62fe
-
SHA512
83fee4adb41a617c115caef2eeb017f7d9b5340f54669c5ae3188c2e05d54a27f32ebd32078c9236322cfa958b0877f76726c6b42a0a483ddde1c8e3cd682323
-
SSDEEP
1536:M42vZxg/skWOLmzZumdKqHL6+m0wnohy++MKlC+BL9oAY04eJ:AvZxGskWLNNdKqr6BbnofVKlC+BW0D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1108 8cf5efeee4beab168dd29a7241c0d6b5.exe -
Executes dropped EXE 1 IoCs
pid Process 1108 8cf5efeee4beab168dd29a7241c0d6b5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4900 8cf5efeee4beab168dd29a7241c0d6b5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4900 8cf5efeee4beab168dd29a7241c0d6b5.exe 1108 8cf5efeee4beab168dd29a7241c0d6b5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1108 4900 8cf5efeee4beab168dd29a7241c0d6b5.exe 84 PID 4900 wrote to memory of 1108 4900 8cf5efeee4beab168dd29a7241c0d6b5.exe 84 PID 4900 wrote to memory of 1108 4900 8cf5efeee4beab168dd29a7241c0d6b5.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf5efeee4beab168dd29a7241c0d6b5.exe"C:\Users\Admin\AppData\Local\Temp\8cf5efeee4beab168dd29a7241c0d6b5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\8cf5efeee4beab168dd29a7241c0d6b5.exeC:\Users\Admin\AppData\Local\Temp\8cf5efeee4beab168dd29a7241c0d6b5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d5346b54198dd9dd354b869f7065745b
SHA1f858d58c4cc436a1a8e4899b646459a8cc218521
SHA256e4e9dadd1ff873f69a421fb48a3beb953b6f54aa6c01f54fedf41b77ff478d10
SHA51239a2d1b1a085411f5a30cbe1d8bd1ffe8496e9c97ccebe9ec8771745ad92a1b62d91bf965dea6417dba331864f09222dea6392d3cf3a1f033e3f4c43f29fb399