Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 03:08
Behavioral task
behavioral1
Sample
8e107774a55bc5524f78fc630459ba8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e107774a55bc5524f78fc630459ba8e.exe
Resource
win10v2004-20231215-en
General
-
Target
8e107774a55bc5524f78fc630459ba8e.exe
-
Size
1.3MB
-
MD5
8e107774a55bc5524f78fc630459ba8e
-
SHA1
5e84572adb19274059e10ee999ad0c6181a97ced
-
SHA256
e6f633834fcdb4fe45f139873734005fcc826103a9353d98c737e5584ada2d21
-
SHA512
e8d4f738fd3b11a34c262207bae8a2ae4cc064975b05c4b92570b0c01f3b3df24dda7eebc50fc90581ce72c3234994154f68b9bfd4891ba4ff9dbc41e84c5a3c
-
SSDEEP
24576:0/KOwCTSSD2tBsksozTOxAQAgTUp7A/rovLtODmNWL5rkRFE/+QIUXkAABzitWc:lCvD2PUozTSHWAULt7NWaFE/+QICkAAE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4596 8e107774a55bc5524f78fc630459ba8e.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 8e107774a55bc5524f78fc630459ba8e.exe -
resource yara_rule behavioral2/memory/1484-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023121-11.dat upx behavioral2/memory/4596-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1484 8e107774a55bc5524f78fc630459ba8e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1484 8e107774a55bc5524f78fc630459ba8e.exe 4596 8e107774a55bc5524f78fc630459ba8e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4596 1484 8e107774a55bc5524f78fc630459ba8e.exe 84 PID 1484 wrote to memory of 4596 1484 8e107774a55bc5524f78fc630459ba8e.exe 84 PID 1484 wrote to memory of 4596 1484 8e107774a55bc5524f78fc630459ba8e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e107774a55bc5524f78fc630459ba8e.exe"C:\Users\Admin\AppData\Local\Temp\8e107774a55bc5524f78fc630459ba8e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\8e107774a55bc5524f78fc630459ba8e.exeC:\Users\Admin\AppData\Local\Temp\8e107774a55bc5524f78fc630459ba8e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4596
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cbb80ad11be5680ac6c94848ec01c5ba
SHA16760707f5c44992d3428482554f56b9bec99e78a
SHA256a906b81d7325feeba5c4d8e3e8b3703e2a49b80fe4f3d40a488803b59cf5c6b9
SHA512293a6d415d68a14256c0f50cf3c7bfe8846980a991c5f59e1e4ee10a9d62ed6fd17cc42b612ab3f87d7fe4f7b99914e40a1ee15de2dd0aca793443ba9ee502cb