Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
8dd6697fd272530800cb01eb25eee159.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8dd6697fd272530800cb01eb25eee159.exe
Resource
win10v2004-20231215-en
General
-
Target
8dd6697fd272530800cb01eb25eee159.exe
-
Size
169KB
-
MD5
8dd6697fd272530800cb01eb25eee159
-
SHA1
717e64e5b81dd1f5b415f6953d6c9cdad0f1dcff
-
SHA256
806f6f350d837409138bd500f7356e749ba476c65fd6295b5b1456b1dd937ad6
-
SHA512
650f5739a7e380a2a74677243f002ecc95a9b6f84a3aacd2ec9c90a3b9600a9a8c41f00b8c1feebaf22a52d6039677482233eecf8b774d856e96aadd09f30ebf
-
SSDEEP
3072:h8fCbXl1LZuBfaqgIjnJepYj2H3TXpmHD6Tn9cTKfXwmMp4p+sKq:h8f6VxZuUqgIjtjI0uTnYKfAup+sKq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3976 8dd6697fd272530800cb01eb25eee159.exe -
Executes dropped EXE 1 IoCs
pid Process 3976 8dd6697fd272530800cb01eb25eee159.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4200 8dd6697fd272530800cb01eb25eee159.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4200 8dd6697fd272530800cb01eb25eee159.exe 3976 8dd6697fd272530800cb01eb25eee159.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4200 wrote to memory of 3976 4200 8dd6697fd272530800cb01eb25eee159.exe 85 PID 4200 wrote to memory of 3976 4200 8dd6697fd272530800cb01eb25eee159.exe 85 PID 4200 wrote to memory of 3976 4200 8dd6697fd272530800cb01eb25eee159.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dd6697fd272530800cb01eb25eee159.exe"C:\Users\Admin\AppData\Local\Temp\8dd6697fd272530800cb01eb25eee159.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\8dd6697fd272530800cb01eb25eee159.exeC:\Users\Admin\AppData\Local\Temp\8dd6697fd272530800cb01eb25eee159.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5adfc6a12c023df867221fe19cc2a73cf
SHA19f4a64da4b511e5dbfa56ef7145a905192b96a15
SHA256b156255df7beeec6397f9ceb45f5c3729d2d65bfa929c208fa8adf62aee74e80
SHA512fffffe8b857006b8f64013b5db760af223cc2f8d53f30900b18b3e23dfc9b59f35e833c703761f5f2c72bedae9f962a5cc01d86d70833af14cd065d93cdd33e5