Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
a0d43e8b557422a21b26bcf72045618e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0d43e8b557422a21b26bcf72045618e.exe
Resource
win10v2004-20240221-en
General
-
Target
a0d43e8b557422a21b26bcf72045618e.exe
-
Size
105KB
-
MD5
a0d43e8b557422a21b26bcf72045618e
-
SHA1
4270d4971c3209bd3d77f612fe58168d3d7c37b4
-
SHA256
075492878d50b3b42dc4f20e09bbda8784b7a9f687383f990246533d2d4c0ffa
-
SHA512
f1727567962d6554678873eb77516cdf20c1e763cc5c8237e09be09de5dc2ed3e387df09743fddc856d1b5fde80cc5d1969098add85c9df3dde614501721992e
-
SSDEEP
3072:7iDUgt7hvbXD5K7XOzClEWXqf14CHkyfpvBQpW9i:7udQTOzPWXi4YvpvaY4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 a0d43e8b557422a21b26bcf72045618e.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 a0d43e8b557422a21b26bcf72045618e.exe -
Loads dropped DLL 1 IoCs
pid Process 2508 a0d43e8b557422a21b26bcf72045618e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2508 a0d43e8b557422a21b26bcf72045618e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2508 a0d43e8b557422a21b26bcf72045618e.exe 2656 a0d43e8b557422a21b26bcf72045618e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2656 2508 a0d43e8b557422a21b26bcf72045618e.exe 29 PID 2508 wrote to memory of 2656 2508 a0d43e8b557422a21b26bcf72045618e.exe 29 PID 2508 wrote to memory of 2656 2508 a0d43e8b557422a21b26bcf72045618e.exe 29 PID 2508 wrote to memory of 2656 2508 a0d43e8b557422a21b26bcf72045618e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d43e8b557422a21b26bcf72045618e.exe"C:\Users\Admin\AppData\Local\Temp\a0d43e8b557422a21b26bcf72045618e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\a0d43e8b557422a21b26bcf72045618e.exeC:\Users\Admin\AppData\Local\Temp\a0d43e8b557422a21b26bcf72045618e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2656
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5b70a7723fccee0ec3be2201f63fa546a
SHA1f036debc27ec9188cf9f4036c15476db1a1956d9
SHA256fc272c55f2ed6192c832ae3e38d1ebced76d51af53af7b779212f5392df92956
SHA5123cce813ab12b020a6999995ca56b83202f1248fa15b3db5ae6cc8dfc886765948ace073e8cd680378635aaaed241485c2e535a222fd0e08dba06c5e44d24ee48