Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
9aeeffdd3c4a026af9ba43af63f0162f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aeeffdd3c4a026af9ba43af63f0162f.exe
Resource
win10v2004-20231215-en
General
-
Target
9aeeffdd3c4a026af9ba43af63f0162f.exe
-
Size
82KB
-
MD5
9aeeffdd3c4a026af9ba43af63f0162f
-
SHA1
42a8cb2051157607c40c0d3cfb65263ececcf4f0
-
SHA256
ab6adba1dee641a1755efbe1539087d4d8a46a345d23e16396e84a157f8da9a3
-
SHA512
ef2c70dd04ea8267e682e79542fd53f2698cd6897a3fe71f63a1dfb2aa4c8e78cf51df4cda0a603db2e5321e5693f807a65a2398f790a71fcd1d0de0d30b60ea
-
SSDEEP
1536:uHHd6cjlreORcWAF0umdTdr7ZvVwmKdbKNo4uu/H1vaXrxkDLpUI:ukIreORgmdTdvZtt8SuuvaWLpUI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4944 9aeeffdd3c4a026af9ba43af63f0162f.exe -
Executes dropped EXE 1 IoCs
pid Process 4944 9aeeffdd3c4a026af9ba43af63f0162f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1224 9aeeffdd3c4a026af9ba43af63f0162f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1224 9aeeffdd3c4a026af9ba43af63f0162f.exe 4944 9aeeffdd3c4a026af9ba43af63f0162f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4944 1224 9aeeffdd3c4a026af9ba43af63f0162f.exe 85 PID 1224 wrote to memory of 4944 1224 9aeeffdd3c4a026af9ba43af63f0162f.exe 85 PID 1224 wrote to memory of 4944 1224 9aeeffdd3c4a026af9ba43af63f0162f.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe"C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exeC:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5755038f4eaff6a66c127cb3a876eec2e
SHA1387e200569f9f07aa5708d145503b01d7ee8f826
SHA25654db5e0673aa1fceef87138cf6e9f35d554f64b2498fc29c9e21c5b2bbfb171a
SHA512382b150bf9acdc318e93c5a39185bf25a3fa7a55474f0d400bd16b4ec012b21b631926c4d4660e339ca7e465696a16c7c6abb4d3fe47c0db7bfdc0a85a7777e6