Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 00:14
Behavioral task
behavioral1
Sample
95be113d0da369ec6cd8626202eff531.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95be113d0da369ec6cd8626202eff531.exe
Resource
win10v2004-20231215-en
General
-
Target
95be113d0da369ec6cd8626202eff531.exe
-
Size
1.3MB
-
MD5
95be113d0da369ec6cd8626202eff531
-
SHA1
044b6f397bf349bd3d50dd895eb265911e53d51d
-
SHA256
aad10a260638a7dad8df983e276988491e8fff10bdc69bf3c113d5aa51ab61ba
-
SHA512
da089143a1240b7d008d973041f7d71e6f53427aa7122c9b482d2b8da075b0578dcd6df8e99290b966b319dfbde078a2d940e9d5dad686e4d9314f0f1fb3af56
-
SSDEEP
24576:ded/ZSSjp8sSpwgjpAeQZYoweQ0LFy6HtGbLmb2YCxLzvG:d2hSS18/pZQZYoweQ0LFkLmbbCx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3424 95be113d0da369ec6cd8626202eff531.exe -
Executes dropped EXE 1 IoCs
pid Process 3424 95be113d0da369ec6cd8626202eff531.exe -
resource yara_rule behavioral2/memory/956-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000c000000023172-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 956 95be113d0da369ec6cd8626202eff531.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 956 95be113d0da369ec6cd8626202eff531.exe 3424 95be113d0da369ec6cd8626202eff531.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 3424 956 95be113d0da369ec6cd8626202eff531.exe 85 PID 956 wrote to memory of 3424 956 95be113d0da369ec6cd8626202eff531.exe 85 PID 956 wrote to memory of 3424 956 95be113d0da369ec6cd8626202eff531.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\95be113d0da369ec6cd8626202eff531.exe"C:\Users\Admin\AppData\Local\Temp\95be113d0da369ec6cd8626202eff531.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\95be113d0da369ec6cd8626202eff531.exeC:\Users\Admin\AppData\Local\Temp\95be113d0da369ec6cd8626202eff531.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58f023664b96617e1b047887eed8c289e
SHA17da58804239c6d0158407d5b6a6ef4cb350b8a7d
SHA25687c3e2d1dd74b28634f484962603ca6cc787681ed5eaec996c76a0eef0b628a5
SHA512a2c81009ca0338bf2f873d9a077adccefc155a02b12290eb8ae276c9df3bf1049e865350816b60aa5cb81f2d061db09ad29d429e4aa98df9b6901fd31c38cd4c