Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
900e0874ac644cb6dc043d953c89a6fa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
900e0874ac644cb6dc043d953c89a6fa.exe
Resource
win10v2004-20231215-en
General
-
Target
900e0874ac644cb6dc043d953c89a6fa.exe
-
Size
57KB
-
MD5
900e0874ac644cb6dc043d953c89a6fa
-
SHA1
7fbfb91142a7d76d761e454fda15642c3ffaa472
-
SHA256
72ec13498264a419837f393804fcdebc3d2996a499a5f409e519f80c9f66b1e3
-
SHA512
fb96eb297cc1bc23450be9d42818b5eef1ceaf4042c67eefb19ab000b6c30eec4f3263c480eb9df11dbcbf76b9c44180ca1754bc9edbe233c4655a3f75ed9beb
-
SSDEEP
1536:qwzT9AgyEu6UzWyDBpkDmgY6dtr0/KHQgyVba:WgABCDmCtrB0V+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4500 900e0874ac644cb6dc043d953c89a6fa.exe -
Executes dropped EXE 1 IoCs
pid Process 4500 900e0874ac644cb6dc043d953c89a6fa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 664 900e0874ac644cb6dc043d953c89a6fa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 664 900e0874ac644cb6dc043d953c89a6fa.exe 4500 900e0874ac644cb6dc043d953c89a6fa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 664 wrote to memory of 4500 664 900e0874ac644cb6dc043d953c89a6fa.exe 85 PID 664 wrote to memory of 4500 664 900e0874ac644cb6dc043d953c89a6fa.exe 85 PID 664 wrote to memory of 4500 664 900e0874ac644cb6dc043d953c89a6fa.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\900e0874ac644cb6dc043d953c89a6fa.exe"C:\Users\Admin\AppData\Local\Temp\900e0874ac644cb6dc043d953c89a6fa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\900e0874ac644cb6dc043d953c89a6fa.exeC:\Users\Admin\AppData\Local\Temp\900e0874ac644cb6dc043d953c89a6fa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD535978853fc2f5db52ece60320c8895bd
SHA10765a7155b3449ae3c51fe315005ccb87c98cc54
SHA256690bb614ef12bf92279eadffa370c56ee0f9f4af18661b4b3baf887cfc6001b3
SHA512cfbbbfc87c2464a2bcbdc2b1db48d4cca8f3b85f270a1cd0df63ca7e51f4bbcef9e45f657a6f4a959de94cd02eff3e35c9167a7c5c49ae39afb9ef50f972d2c7