Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
8a9d1ecc07e6e0afc48f10eb67ed4925.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a9d1ecc07e6e0afc48f10eb67ed4925.exe
Resource
win10v2004-20231215-en
General
-
Target
8a9d1ecc07e6e0afc48f10eb67ed4925.exe
-
Size
82KB
-
MD5
8a9d1ecc07e6e0afc48f10eb67ed4925
-
SHA1
80ef3e51eea364290366d40667b50c5b0dc03834
-
SHA256
fbedf74919f49bc1a890f0f6533927505a92114dc31cea4b9b0ae0e3d4665dd5
-
SHA512
339b75591571bd0477ae96fb141e84463160cd0c675793e4920d7d9b08bca27cdd89333e89e71c369192df83ac36821d9d124541055173ff2c914b7360ea5aba
-
SSDEEP
1536:OdWdv+FCHXoa7eTSwVKmcir5E+97aIE9Y1IMxtN7XpYweMm4PIrI6v:O0FHNi+RmJa+wIE+OM3PYFOE9v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4340 8a9d1ecc07e6e0afc48f10eb67ed4925.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 8a9d1ecc07e6e0afc48f10eb67ed4925.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4512 8a9d1ecc07e6e0afc48f10eb67ed4925.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4512 8a9d1ecc07e6e0afc48f10eb67ed4925.exe 4340 8a9d1ecc07e6e0afc48f10eb67ed4925.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4340 4512 8a9d1ecc07e6e0afc48f10eb67ed4925.exe 85 PID 4512 wrote to memory of 4340 4512 8a9d1ecc07e6e0afc48f10eb67ed4925.exe 85 PID 4512 wrote to memory of 4340 4512 8a9d1ecc07e6e0afc48f10eb67ed4925.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9d1ecc07e6e0afc48f10eb67ed4925.exe"C:\Users\Admin\AppData\Local\Temp\8a9d1ecc07e6e0afc48f10eb67ed4925.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\8a9d1ecc07e6e0afc48f10eb67ed4925.exeC:\Users\Admin\AppData\Local\Temp\8a9d1ecc07e6e0afc48f10eb67ed4925.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5948d5a0eec96b5acf5aaec9bd088b046
SHA17a6777d5addab342c1c60ee0175c2e3306e5623a
SHA256dcd4ed73a3bf8a1acd787850db45b09328fd7a2c2cea2bda91a3fd236f3f507b
SHA512740a62deb54f906f51ef70c93102b693ddfb4536dd04fec54ea20237b55991a3bbf059f248386c64339c3cc4a4835eb772f9ee924e23a722b7355c2d26c475a7