Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 16:45
Behavioral task
behavioral1
Sample
99a3b72fef81d3215a4dd79061d19b9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99a3b72fef81d3215a4dd79061d19b9d.exe
Resource
win10v2004-20231215-en
General
-
Target
99a3b72fef81d3215a4dd79061d19b9d.exe
-
Size
1.3MB
-
MD5
99a3b72fef81d3215a4dd79061d19b9d
-
SHA1
fcea1e410dd604b36ce11f9902b071653c013c40
-
SHA256
13f610764567f9b167164f0f84861c0ed778dba63130c195f2a8ca8f4601d029
-
SHA512
8b0c113ed5bed667ad78266546cf83386716784d8f66f68b058cefc5cb4513657af7e8199b89f98c49b59a85271b3265a9c0f687d08bd38fa71420e39a06cdcc
-
SSDEEP
24576:TbJ/x/iltsZAa3kUXhnWXs5HpOwTGJqKlh2DRKzKFmCQU5kCyTKht/AfdwTa9PX4:TbBxEXa3kgpWX+JxTulh2pF/95jKB9PI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 99a3b72fef81d3215a4dd79061d19b9d.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 99a3b72fef81d3215a4dd79061d19b9d.exe -
resource yara_rule behavioral2/memory/4960-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0007000000023217-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4960 99a3b72fef81d3215a4dd79061d19b9d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4960 99a3b72fef81d3215a4dd79061d19b9d.exe 2996 99a3b72fef81d3215a4dd79061d19b9d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 2996 4960 99a3b72fef81d3215a4dd79061d19b9d.exe 85 PID 4960 wrote to memory of 2996 4960 99a3b72fef81d3215a4dd79061d19b9d.exe 85 PID 4960 wrote to memory of 2996 4960 99a3b72fef81d3215a4dd79061d19b9d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a3b72fef81d3215a4dd79061d19b9d.exe"C:\Users\Admin\AppData\Local\Temp\99a3b72fef81d3215a4dd79061d19b9d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\99a3b72fef81d3215a4dd79061d19b9d.exeC:\Users\Admin\AppData\Local\Temp\99a3b72fef81d3215a4dd79061d19b9d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2996
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD511eff2ff13b3995083eea1e665742292
SHA1e21c82698777c2ff219861bef0973c67a4b5713c
SHA256596735503ec2083499f219dce178c25e93bc4d731c3157fd7aed05b46bd03aba
SHA5127a736ce30d2cf04bc1a22d5723ccdf373a77c63edd620f82356087de9cb15f34c85762e5262e08b18126243ef49825158a8974de6b02ae4049e2758eae473d3d