Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
8faf62bc8bbd3dd922f757660d2685cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8faf62bc8bbd3dd922f757660d2685cb.exe
Resource
win10v2004-20231215-en
General
-
Target
8faf62bc8bbd3dd922f757660d2685cb.exe
-
Size
82KB
-
MD5
8faf62bc8bbd3dd922f757660d2685cb
-
SHA1
8a653ae5d1e160e008a7d6e74a5f2cef1f70c021
-
SHA256
1a5be96ad81ac90b204c82cebef456e06c23d8c5881099d45aa2cb24a99df1cb
-
SHA512
1e1c251b5037cafec6fb7181cffe79ba68253b789b2b0ff8f86ccc366dc6bac78d18596c7f9607d95a963e54145e082c04f1ca8ba0abe088d04cbae22a7939ef
-
SSDEEP
1536:rl8zNNvssdCkhJQ6yuylRnr4uaz5+6b4iIKLqu/NoZOdN73iyP1+ZIz+z4zTcc:SDvIkDQ6ylBcXzU0F/NhdVV07q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 8faf62bc8bbd3dd922f757660d2685cb.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 8faf62bc8bbd3dd922f757660d2685cb.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 8faf62bc8bbd3dd922f757660d2685cb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 8faf62bc8bbd3dd922f757660d2685cb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 8faf62bc8bbd3dd922f757660d2685cb.exe 2372 8faf62bc8bbd3dd922f757660d2685cb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2372 2228 8faf62bc8bbd3dd922f757660d2685cb.exe 29 PID 2228 wrote to memory of 2372 2228 8faf62bc8bbd3dd922f757660d2685cb.exe 29 PID 2228 wrote to memory of 2372 2228 8faf62bc8bbd3dd922f757660d2685cb.exe 29 PID 2228 wrote to memory of 2372 2228 8faf62bc8bbd3dd922f757660d2685cb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8faf62bc8bbd3dd922f757660d2685cb.exe"C:\Users\Admin\AppData\Local\Temp\8faf62bc8bbd3dd922f757660d2685cb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\8faf62bc8bbd3dd922f757660d2685cb.exeC:\Users\Admin\AppData\Local\Temp\8faf62bc8bbd3dd922f757660d2685cb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d963383e395f50f0b5c1027211ebf830
SHA178bd370213535af467158b931e2af6c4c9f3713c
SHA256cc5e9aa38efa6ff10bd4bc92abe5e7efd0ec6f499de727a03945b6daa49bc660
SHA512837d0d1ed2f13caf03dbb66fe5d33cd2ef72dd949e286c7f537b3b8577d4e6b408f84c13664a252e43aafbf96d934630162172f4350c6ad5044fdf86b8a90dd4