Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
99acd322262d072638866c324b7e49aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99acd322262d072638866c324b7e49aa.exe
Resource
win10v2004-20231222-en
General
-
Target
99acd322262d072638866c324b7e49aa.exe
-
Size
82KB
-
MD5
99acd322262d072638866c324b7e49aa
-
SHA1
83c6cbad686faabffd23fde9577fc114752a05d2
-
SHA256
ae2fe9ca5d2fb4ea2b6c39848df564585a0ad174324a6c7644de95d3745c0b18
-
SHA512
90aaadc132037c2141257c01c3f86230a8419cac5e5193bdc495f24720ea88064d6585f748b9a2c05d75b36dbc2fe06cc829731595a22a1d772d436e24807e27
-
SSDEEP
1536:9CTXCdepz6vQ6P33xeNlj6M4O0xRDk5YF+HyoD2vrWWTkqfne/FBqj4:9CTXzGvD/3Kl8nDkE+Hyy2DHK/FBr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 99acd322262d072638866c324b7e49aa.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 99acd322262d072638866c324b7e49aa.exe -
Loads dropped DLL 1 IoCs
pid Process 1340 99acd322262d072638866c324b7e49aa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1340 99acd322262d072638866c324b7e49aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1340 99acd322262d072638866c324b7e49aa.exe 2684 99acd322262d072638866c324b7e49aa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2684 1340 99acd322262d072638866c324b7e49aa.exe 29 PID 1340 wrote to memory of 2684 1340 99acd322262d072638866c324b7e49aa.exe 29 PID 1340 wrote to memory of 2684 1340 99acd322262d072638866c324b7e49aa.exe 29 PID 1340 wrote to memory of 2684 1340 99acd322262d072638866c324b7e49aa.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\99acd322262d072638866c324b7e49aa.exe"C:\Users\Admin\AppData\Local\Temp\99acd322262d072638866c324b7e49aa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\99acd322262d072638866c324b7e49aa.exeC:\Users\Admin\AppData\Local\Temp\99acd322262d072638866c324b7e49aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5293df35066b596884ba53eae902d23bb
SHA1d181c1bcfa4892056814b7102cd4a1f0720f3ff9
SHA2569207a8e23d76ca90504639f9462ff1810c128b13ab31595ee1fd77ba9948ceb2
SHA512bef45b1fad17b31841cfcba10edc2849eaa70c1c047202aa53087425d3b6c2b59f894710d7b8e1f4e0a0e7ac61ddee7c352d6f49f07c9bc349770a33f7f1a9fd