Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 07:56
Behavioral task
behavioral1
Sample
a1589759d69c29c1e27dfd927455ef94.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1589759d69c29c1e27dfd927455ef94.exe
Resource
win10v2004-20240221-en
General
-
Target
a1589759d69c29c1e27dfd927455ef94.exe
-
Size
5.3MB
-
MD5
a1589759d69c29c1e27dfd927455ef94
-
SHA1
93ba9315a2ea5bb9f0869ea70bde4bfef6870f17
-
SHA256
9bb334388c95b59245355b373f65896aaed5d140aedd4db9ce225b495f2b256f
-
SHA512
11f2876320840356fc73e529d3f77d40722fdb44293afa57be78b3433127abc7c3adf7dc3bf096291676db3605c6603b23e003afe2766b0d9ebb0975f127b6ac
-
SSDEEP
98304:SkyqkwbWPvHBeb1T1aqcM7NuhnrBGnJEZBeb1T1aq:nyFo3b7atM7NuFBub7a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1416 a1589759d69c29c1e27dfd927455ef94.exe -
Executes dropped EXE 1 IoCs
pid Process 1416 a1589759d69c29c1e27dfd927455ef94.exe -
Loads dropped DLL 1 IoCs
pid Process 1968 a1589759d69c29c1e27dfd927455ef94.exe -
resource yara_rule behavioral1/memory/1968-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x0008000000012265-11.dat upx behavioral1/memory/1416-16-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 a1589759d69c29c1e27dfd927455ef94.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1968 a1589759d69c29c1e27dfd927455ef94.exe 1416 a1589759d69c29c1e27dfd927455ef94.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1416 1968 a1589759d69c29c1e27dfd927455ef94.exe 28 PID 1968 wrote to memory of 1416 1968 a1589759d69c29c1e27dfd927455ef94.exe 28 PID 1968 wrote to memory of 1416 1968 a1589759d69c29c1e27dfd927455ef94.exe 28 PID 1968 wrote to memory of 1416 1968 a1589759d69c29c1e27dfd927455ef94.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1589759d69c29c1e27dfd927455ef94.exe"C:\Users\Admin\AppData\Local\Temp\a1589759d69c29c1e27dfd927455ef94.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\a1589759d69c29c1e27dfd927455ef94.exeC:\Users\Admin\AppData\Local\Temp\a1589759d69c29c1e27dfd927455ef94.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5f0837168418a9b273c477071b5563d2b
SHA1612586be2fe195c93651d2259c3cee64cb89cee7
SHA2567886cb3b9e2108d0fa74879f9e2f847abb8d8f91dfb07798b174feae1da91121
SHA5122aca92f91606db3dc1aa66015ae1da3e5e2de0baa7a9a1f7352be82394da2b5cf0277681acb839d7750c938db86d532df785c795502eb47a3895ebe7377eedd9