Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 16:02

General

  • Target

    a23a211b7d68d8a77c14e60386ef4a64.exe

  • Size

    84KB

  • MD5

    a23a211b7d68d8a77c14e60386ef4a64

  • SHA1

    fd3697d042266336b66340a347bb90791a420e07

  • SHA256

    7cde679fa9090a07792387b83ba843d9377671f78e86bffa7e0bd1c37b087837

  • SHA512

    4a34c7baed91c92429bd485ca5e076d6aa742b42bd638eefa281ce879adb11906b288a6a396e503fe8d42a1b55c77c99142229b0d8aede1e53529486ce83be17

  • SSDEEP

    1536:smNCwjzsOT/oy98kES4bhU1W+TS0RvbEVdY6viqWejgnHPMs4iQ8:s8Dd9FEblf+PRvbsY6vhAGiL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
    "C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
      C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe

    Filesize

    84KB

    MD5

    6b52575be9bf335b80f82498574fa9fd

    SHA1

    7a7ec4a3a98a1bf1303eebb2383bbf97017d2e88

    SHA256

    42edce2503bcbee860c9951fe58a8dd271c78bd5da7e6f92d9269a04f8e1e305

    SHA512

    f3ea0c54963c64bf5ceafc08f3e4d256676fa2483a4348a491e1230f12763519c8045bb73591b44745e3ec365215cc0d19945558c53b646eb0d0cf753a682400

  • memory/436-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/436-14-0x00000000001D0000-0x00000000001FF000-memory.dmp

    Filesize

    188KB

  • memory/436-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/436-23-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB

  • memory/2900-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2900-1-0x0000000001430000-0x000000000145F000-memory.dmp

    Filesize

    188KB

  • memory/2900-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2900-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB