Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 11:50
Behavioral task
behavioral1
Sample
a1cc55b4a1ce416f2aaf93d41b8d4a09.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1cc55b4a1ce416f2aaf93d41b8d4a09.exe
Resource
win10v2004-20240221-en
General
-
Target
a1cc55b4a1ce416f2aaf93d41b8d4a09.exe
-
Size
2.7MB
-
MD5
a1cc55b4a1ce416f2aaf93d41b8d4a09
-
SHA1
873430ad240d36e1874f0fa8f4237e9cb958893d
-
SHA256
f24ae5be791db0f71d062193991b73aa16b3823de829f0cc70ca739e0f819510
-
SHA512
708a0d7d51504e4e762777f36fe02b8f613d42b6b40951b0bf6b1020d63f38d326765742cf5537471bf10fdbb5bccd6998f7ddf09ec6f45986b08759ff3a51ea
-
SSDEEP
49152:iuHjI8tOj6gDwPyLfAjDN/RUHSHvv648r9fsHAJImSLMW:TDPOjMPycVRUHSPv64i956mSLMW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 844 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe -
Executes dropped EXE 1 IoCs
pid Process 844 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe -
resource yara_rule behavioral2/memory/2792-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000b00000001e597-12.dat upx behavioral2/memory/844-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2792 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2792 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe 844 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2792 wrote to memory of 844 2792 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe 91 PID 2792 wrote to memory of 844 2792 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe 91 PID 2792 wrote to memory of 844 2792 a1cc55b4a1ce416f2aaf93d41b8d4a09.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1cc55b4a1ce416f2aaf93d41b8d4a09.exe"C:\Users\Admin\AppData\Local\Temp\a1cc55b4a1ce416f2aaf93d41b8d4a09.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\a1cc55b4a1ce416f2aaf93d41b8d4a09.exeC:\Users\Admin\AppData\Local\Temp\a1cc55b4a1ce416f2aaf93d41b8d4a09.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a5245cbbba5b79608b31b165c52377ae
SHA13411a7974d0eb31d38b4aca0599ec34a425c4b10
SHA256cac10a9166e0f2fd6c7d0339f21574f454f535d15e7450e0dd1bfbfc5312331b
SHA51235dff8f21c9ec86af093c1590d0fa8816404d8948cdf67284d9163e648743e741e12ec3ba373dbfcf1ea9c30b6ac32c167e98428efbf9c04ff01729935cff929