Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
99580b3301bdb169cf89486107fbb019.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99580b3301bdb169cf89486107fbb019.exe
Resource
win10v2004-20231215-en
General
-
Target
99580b3301bdb169cf89486107fbb019.exe
-
Size
82KB
-
MD5
99580b3301bdb169cf89486107fbb019
-
SHA1
59605f4d31331e78585294fdfec22a8435d86423
-
SHA256
12a2e7e4cadf81cc5dc13d045adb6de06d08e8b4b4adb5cd68b1368be92f0c4e
-
SHA512
21d12be39aa66314584c77b7eff91fd258f4f842d1f5b182c361270a61ce598d9e1d6b501b3becf41a9eb2c3b8722fe13dba7db5f98a06d0979a3a035455bac7
-
SSDEEP
1536:IPcFDdvTUPigetmBUS9ifRoL9lsWaXP8rqrefLeIBFA3VGKGVR:gyTUPFnxI0gP82eaIBFA3eR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 99580b3301bdb169cf89486107fbb019.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 99580b3301bdb169cf89486107fbb019.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 99580b3301bdb169cf89486107fbb019.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 99580b3301bdb169cf89486107fbb019.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2384 99580b3301bdb169cf89486107fbb019.exe 3056 99580b3301bdb169cf89486107fbb019.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3056 2384 99580b3301bdb169cf89486107fbb019.exe 29 PID 2384 wrote to memory of 3056 2384 99580b3301bdb169cf89486107fbb019.exe 29 PID 2384 wrote to memory of 3056 2384 99580b3301bdb169cf89486107fbb019.exe 29 PID 2384 wrote to memory of 3056 2384 99580b3301bdb169cf89486107fbb019.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe"C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exeC:\Users\Admin\AppData\Local\Temp\99580b3301bdb169cf89486107fbb019.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d53c843badb4e3f365b94ab49371d821
SHA1ff4801fcef491d22af3df87f638be6b00cf42645
SHA256837e81766d7b442ad586828e59489dc606e53480c3af84b555e48af77b4fc6bc
SHA512342bbc7ea7a03feab012028ccaed033d3ff86d76a3e3a0c3063c9e6b6a6e84365c058f8185ef9fe4e5864f056fa5ed5330d47df5e2edcd9e74441ecf9aeb5036