Analysis
-
max time kernel
93s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 23:54
Behavioral task
behavioral1
Sample
a0ac2d7f9647acd554e45f643578911d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0ac2d7f9647acd554e45f643578911d.exe
Resource
win10v2004-20240221-en
General
-
Target
a0ac2d7f9647acd554e45f643578911d.exe
-
Size
2.4MB
-
MD5
a0ac2d7f9647acd554e45f643578911d
-
SHA1
45d55c39e25699e9dcdb1a776cf29005f7e73d4e
-
SHA256
4ad0523480f7d9c073ab68a901a4a53ce4a61444120f21ac7a4f4aa519795c21
-
SHA512
b324eb070e35788c6d6acf874c87bb748a669732539782462aadc7abba53c59529fa2246bb8451a1f15de3464d1eb17947473b9942c86345a323a4f25825129e
-
SSDEEP
49152:Lxi4WHpOCz5d2iFDOnrMNOHP4M338dB2IBlGuuDVUsdxxjr:NDaMCz32y2MNOHgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4772 a0ac2d7f9647acd554e45f643578911d.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 a0ac2d7f9647acd554e45f643578911d.exe -
resource yara_rule behavioral2/memory/5108-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00060000000231f8-11.dat upx behavioral2/memory/4772-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5108 a0ac2d7f9647acd554e45f643578911d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5108 a0ac2d7f9647acd554e45f643578911d.exe 4772 a0ac2d7f9647acd554e45f643578911d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5108 wrote to memory of 4772 5108 a0ac2d7f9647acd554e45f643578911d.exe 88 PID 5108 wrote to memory of 4772 5108 a0ac2d7f9647acd554e45f643578911d.exe 88 PID 5108 wrote to memory of 4772 5108 a0ac2d7f9647acd554e45f643578911d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0ac2d7f9647acd554e45f643578911d.exe"C:\Users\Admin\AppData\Local\Temp\a0ac2d7f9647acd554e45f643578911d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\a0ac2d7f9647acd554e45f643578911d.exeC:\Users\Admin\AppData\Local\Temp\a0ac2d7f9647acd554e45f643578911d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD517729a681c02520a9d3cb36febe7400d
SHA18a68c8405a703bbb2250555e32121757766cdda1
SHA256b2f914c8dd08b60b41b90e5c8247526e9bb23b6e4059348337229bf73fa6a03b
SHA512139a69c89e21f906184055f108192cd309df824bc3c79b51911a229b53e5fa3f7d6ba354b0795a836a72aea896d5754b9a4c143463a103cafd1f55ed25110402