Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 10:37
Behavioral task
behavioral1
Sample
9934199425ee916a450ee65e1ed16a17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9934199425ee916a450ee65e1ed16a17.exe
Resource
win10v2004-20231215-en
General
-
Target
9934199425ee916a450ee65e1ed16a17.exe
-
Size
2.7MB
-
MD5
9934199425ee916a450ee65e1ed16a17
-
SHA1
8b5fc0fd75ac82a3f6f62929c2064bd77563b3e4
-
SHA256
111f9dd3ea25e67300f2eb3786f931e5dbf2ba0d5fce84dda995dd5501d95924
-
SHA512
d45b7dcd8f25ff782864290f236d6aaddfa40b835548d9f71173f12846110439bfa525c83e57d88bc10775f0033ab960d776932eebf77825f23411474137528e
-
SSDEEP
49152:uawUAHuq8/kHOh8BytBic7maX/IDM66EiR9X+tIqZ3mRmijLuapH4V+fS2zJHRmD:xtku2c/IY66LHObZ2RNG/+fS2aHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3944 9934199425ee916a450ee65e1ed16a17.exe -
Executes dropped EXE 1 IoCs
pid Process 3944 9934199425ee916a450ee65e1ed16a17.exe -
resource yara_rule behavioral2/memory/4156-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0009000000023037-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4156 9934199425ee916a450ee65e1ed16a17.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4156 9934199425ee916a450ee65e1ed16a17.exe 3944 9934199425ee916a450ee65e1ed16a17.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 3944 4156 9934199425ee916a450ee65e1ed16a17.exe 85 PID 4156 wrote to memory of 3944 4156 9934199425ee916a450ee65e1ed16a17.exe 85 PID 4156 wrote to memory of 3944 4156 9934199425ee916a450ee65e1ed16a17.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9934199425ee916a450ee65e1ed16a17.exe"C:\Users\Admin\AppData\Local\Temp\9934199425ee916a450ee65e1ed16a17.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\9934199425ee916a450ee65e1ed16a17.exeC:\Users\Admin\AppData\Local\Temp\9934199425ee916a450ee65e1ed16a17.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD59d1c58b640dbf002dbe40adf28ceeb4a
SHA1f134a94f2cbe67e9b55c6ead7f7a43f980df4cad
SHA2569fb879616f493c979daf7ab8793c1d2b8f523e93bd3204f2ce77b3e401e52154
SHA512631bd7a5e5f1874a203465db0e3ce98c70977afb0fcd68e6c247396426d088c272c92364f980bcdee3731fdae47b220f9fd32c6d27c1d493e1ba271800f1fe0c