Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
970c9879fa57c32270536b9c6930707b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
970c9879fa57c32270536b9c6930707b.exe
Resource
win10v2004-20231222-en
General
-
Target
970c9879fa57c32270536b9c6930707b.exe
-
Size
82KB
-
MD5
970c9879fa57c32270536b9c6930707b
-
SHA1
f8bc446d850e018170873ef76264e4a0d32accaa
-
SHA256
e88c0c455863499f5a29a96cc7ad1a46eb773b31ccd75b306adfbd456c31c581
-
SHA512
55413d6a5f5c33e91ba16929245a1fda7407217a0a0bd1081480feef43102de1bb7b845085a0460b30c9ac24b2194fb70a87126261af6cc44f59804a2c6929df
-
SSDEEP
1536:FaG6RgYyLd3WhB4VaW78p8pyU8wNy7PZD0fr9fxmmwr4AuHaiM2:Q/Qd3n78O18N6j9pmmwfu6iH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 970c9879fa57c32270536b9c6930707b.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 970c9879fa57c32270536b9c6930707b.exe -
Loads dropped DLL 1 IoCs
pid Process 1316 970c9879fa57c32270536b9c6930707b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1316 970c9879fa57c32270536b9c6930707b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1316 970c9879fa57c32270536b9c6930707b.exe 2216 970c9879fa57c32270536b9c6930707b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2216 1316 970c9879fa57c32270536b9c6930707b.exe 29 PID 1316 wrote to memory of 2216 1316 970c9879fa57c32270536b9c6930707b.exe 29 PID 1316 wrote to memory of 2216 1316 970c9879fa57c32270536b9c6930707b.exe 29 PID 1316 wrote to memory of 2216 1316 970c9879fa57c32270536b9c6930707b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\970c9879fa57c32270536b9c6930707b.exe"C:\Users\Admin\AppData\Local\Temp\970c9879fa57c32270536b9c6930707b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\970c9879fa57c32270536b9c6930707b.exeC:\Users\Admin\AppData\Local\Temp\970c9879fa57c32270536b9c6930707b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD583cba80f944feaebb6222d0b335fd68a
SHA1ae6d411bb5add032485a0d74250c04ca80a26987
SHA256f5f3383fe523a380b66eb9660cedea04efcf1937ce65b3f5d8d0f37b9a0d5981
SHA512003c6e2eb06cf0c2e65d33cadaa091ebe7b31f2f0d3174a666e73beb40b96854d8f915bdea46760f97c8771199b385a4b09a4d81d60c0c5b01e1bfcfb5f96436