Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
a23a211b7d68d8a77c14e60386ef4a64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a23a211b7d68d8a77c14e60386ef4a64.exe
Resource
win10v2004-20240221-en
General
-
Target
a23a211b7d68d8a77c14e60386ef4a64.exe
-
Size
84KB
-
MD5
a23a211b7d68d8a77c14e60386ef4a64
-
SHA1
fd3697d042266336b66340a347bb90791a420e07
-
SHA256
7cde679fa9090a07792387b83ba843d9377671f78e86bffa7e0bd1c37b087837
-
SHA512
4a34c7baed91c92429bd485ca5e076d6aa742b42bd638eefa281ce879adb11906b288a6a396e503fe8d42a1b55c77c99142229b0d8aede1e53529486ce83be17
-
SSDEEP
1536:smNCwjzsOT/oy98kES4bhU1W+TS0RvbEVdY6viqWejgnHPMs4iQ8:s8Dd9FEblf+PRvbsY6vhAGiL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2032 a23a211b7d68d8a77c14e60386ef4a64.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 a23a211b7d68d8a77c14e60386ef4a64.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2180 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2180 a23a211b7d68d8a77c14e60386ef4a64.exe 2032 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2032 2180 a23a211b7d68d8a77c14e60386ef4a64.exe 29 PID 2180 wrote to memory of 2032 2180 a23a211b7d68d8a77c14e60386ef4a64.exe 29 PID 2180 wrote to memory of 2032 2180 a23a211b7d68d8a77c14e60386ef4a64.exe 29 PID 2180 wrote to memory of 2032 2180 a23a211b7d68d8a77c14e60386ef4a64.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exeC:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5d0c1043204d93d813183802d2631c4d3
SHA1f9be2d7e72e6fec281137898a32a5c43a9c88a34
SHA256803401373542316d7489ee595c67040780e582b5d98b05e478ac9f099aeb8045
SHA51238e4258fa893e98548f7256a395887013510717754aea93c555917c3836f051a1d5869cfff0192bcf8d223e71587e27c38544cfd401905d401b71bd10bd57aca