Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 15:26
Behavioral task
behavioral1
Sample
9c06f79b249f01e5333f2b7327502e3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9c06f79b249f01e5333f2b7327502e3e.exe
Resource
win10v2004-20231215-en
General
-
Target
9c06f79b249f01e5333f2b7327502e3e.exe
-
Size
1.3MB
-
MD5
9c06f79b249f01e5333f2b7327502e3e
-
SHA1
b3816189467add3db446fbf4b4e07233c73a5b51
-
SHA256
5064d5d54a6b94946b036e7c27c8fcfe053861a365cddbd61de5387d172aab81
-
SHA512
0194267787b1591e9146017dde71a1ea139c069cea22b98681b5078ccf6df6608d3b004df7cf07e8f10ce0d1073463b2ce8df27cf5ed8779a79b8dccbfbaaf88
-
SSDEEP
24576:mKp9+rigb4uiq0zRPsHRTOXuUJXY9YnQgscUgGoGmR7WvG:nPTgb45q0FPsxqLY9YQz0lr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 9c06f79b249f01e5333f2b7327502e3e.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 9c06f79b249f01e5333f2b7327502e3e.exe -
resource yara_rule behavioral2/memory/2784-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x001100000002315e-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2784 9c06f79b249f01e5333f2b7327502e3e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2784 9c06f79b249f01e5333f2b7327502e3e.exe 4900 9c06f79b249f01e5333f2b7327502e3e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4900 2784 9c06f79b249f01e5333f2b7327502e3e.exe 85 PID 2784 wrote to memory of 4900 2784 9c06f79b249f01e5333f2b7327502e3e.exe 85 PID 2784 wrote to memory of 4900 2784 9c06f79b249f01e5333f2b7327502e3e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe"C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exeC:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e0ead0298fbde5b8b33cc2a1a26a5347
SHA1c9cd8261f6e995d85df15426c783105479823791
SHA256519d1122460311cf4e30491f8701222f51a8edbeef901917a358970c97d6c65c
SHA512257c4f81c2faf010efe589112883ffd6cd9e90be0a99f981f630cd712f1a2740acefc4858f48911f7d6d49ff9e85a02b9d07ecedccde7117e1e7d5437d1c1503