Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
a0dd33da4c426543f34494db52040a2c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0dd33da4c426543f34494db52040a2c.exe
Resource
win10v2004-20240221-en
General
-
Target
a0dd33da4c426543f34494db52040a2c.exe
-
Size
82KB
-
MD5
a0dd33da4c426543f34494db52040a2c
-
SHA1
b0e0f995abde0f0d28c3065fcb557195b9bcd09f
-
SHA256
d8a4d3e2b19aef38a1f1ed4511dad7a5fd30d00ba12edd0ae9a8b9191e5da84d
-
SHA512
248784ba147f523378253b2160d2754b252ce3450e5917046deea3e247804bb83442e4f77712c4868beb136e76752545f1bb3e70a5df5cd55b60b69a5f8686ca
-
SSDEEP
1536:sHh0tMDvhTa6s4dUd5uRP7XQPXE0y39oAJB+V+DIt13PUW4SLaqXhWnFkD:0hYM7h2eUdsPMPXBUSc8ua/UWPLIE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 a0dd33da4c426543f34494db52040a2c.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 a0dd33da4c426543f34494db52040a2c.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 a0dd33da4c426543f34494db52040a2c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3044 a0dd33da4c426543f34494db52040a2c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3044 a0dd33da4c426543f34494db52040a2c.exe 2984 a0dd33da4c426543f34494db52040a2c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2984 3044 a0dd33da4c426543f34494db52040a2c.exe 29 PID 3044 wrote to memory of 2984 3044 a0dd33da4c426543f34494db52040a2c.exe 29 PID 3044 wrote to memory of 2984 3044 a0dd33da4c426543f34494db52040a2c.exe 29 PID 3044 wrote to memory of 2984 3044 a0dd33da4c426543f34494db52040a2c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0dd33da4c426543f34494db52040a2c.exe"C:\Users\Admin\AppData\Local\Temp\a0dd33da4c426543f34494db52040a2c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\a0dd33da4c426543f34494db52040a2c.exeC:\Users\Admin\AppData\Local\Temp\a0dd33da4c426543f34494db52040a2c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f08ea2086e571af08a34f1bf23339fe6
SHA16678056fab37990f1beee3cf8e8c632307a0317a
SHA25666cb2a7d2eb70d1535cc3cf0409539425ea410011eab05b36be3b8401dbfacdd
SHA512075f84f82b998934dc6de80b4d6d30b312415bca96afd77b27e3fa223c216650e23ca304bb500b93007b4eafe3aa79c3d50d750a45b5dc4ca45e51955c2d6d9b