Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
a23a211b7d68d8a77c14e60386ef4a64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a23a211b7d68d8a77c14e60386ef4a64.exe
Resource
win10v2004-20240221-en
General
-
Target
a23a211b7d68d8a77c14e60386ef4a64.exe
-
Size
84KB
-
MD5
a23a211b7d68d8a77c14e60386ef4a64
-
SHA1
fd3697d042266336b66340a347bb90791a420e07
-
SHA256
7cde679fa9090a07792387b83ba843d9377671f78e86bffa7e0bd1c37b087837
-
SHA512
4a34c7baed91c92429bd485ca5e076d6aa742b42bd638eefa281ce879adb11906b288a6a396e503fe8d42a1b55c77c99142229b0d8aede1e53529486ce83be17
-
SSDEEP
1536:smNCwjzsOT/oy98kES4bhU1W+TS0RvbEVdY6viqWejgnHPMs4iQ8:s8Dd9FEblf+PRvbsY6vhAGiL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 436 a23a211b7d68d8a77c14e60386ef4a64.exe -
Executes dropped EXE 1 IoCs
pid Process 436 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2900 a23a211b7d68d8a77c14e60386ef4a64.exe 436 a23a211b7d68d8a77c14e60386ef4a64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 436 2900 a23a211b7d68d8a77c14e60386ef4a64.exe 87 PID 2900 wrote to memory of 436 2900 a23a211b7d68d8a77c14e60386ef4a64.exe 87 PID 2900 wrote to memory of 436 2900 a23a211b7d68d8a77c14e60386ef4a64.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exeC:\Users\Admin\AppData\Local\Temp\a23a211b7d68d8a77c14e60386ef4a64.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56b52575be9bf335b80f82498574fa9fd
SHA17a7ec4a3a98a1bf1303eebb2383bbf97017d2e88
SHA25642edce2503bcbee860c9951fe58a8dd271c78bd5da7e6f92d9269a04f8e1e305
SHA512f3ea0c54963c64bf5ceafc08f3e4d256676fa2483a4348a491e1230f12763519c8045bb73591b44745e3ec365215cc0d19945558c53b646eb0d0cf753a682400