Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 05:55

General

  • Target

    9aeeffdd3c4a026af9ba43af63f0162f.exe

  • Size

    82KB

  • MD5

    9aeeffdd3c4a026af9ba43af63f0162f

  • SHA1

    42a8cb2051157607c40c0d3cfb65263ececcf4f0

  • SHA256

    ab6adba1dee641a1755efbe1539087d4d8a46a345d23e16396e84a157f8da9a3

  • SHA512

    ef2c70dd04ea8267e682e79542fd53f2698cd6897a3fe71f63a1dfb2aa4c8e78cf51df4cda0a603db2e5321e5693f807a65a2398f790a71fcd1d0de0d30b60ea

  • SSDEEP

    1536:uHHd6cjlreORcWAF0umdTdr7ZvVwmKdbKNo4uu/H1vaXrxkDLpUI:ukIreORgmdTdvZtt8SuuvaWLpUI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe
    "C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe
      C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9aeeffdd3c4a026af9ba43af63f0162f.exe

    Filesize

    82KB

    MD5

    755038f4eaff6a66c127cb3a876eec2e

    SHA1

    387e200569f9f07aa5708d145503b01d7ee8f826

    SHA256

    54db5e0673aa1fceef87138cf6e9f35d554f64b2498fc29c9e21c5b2bbfb171a

    SHA512

    382b150bf9acdc318e93c5a39185bf25a3fa7a55474f0d400bd16b4ec012b21b631926c4d4660e339ca7e465696a16c7c6abb4d3fe47c0db7bfdc0a85a7777e6

  • memory/1224-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1224-1-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/1224-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1224-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4944-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4944-15-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/4944-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4944-25-0x00000000014E0000-0x00000000014FB000-memory.dmp

    Filesize

    108KB