Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
a23f6d59122dd58976617e18c50f52f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a23f6d59122dd58976617e18c50f52f5.exe
Resource
win10v2004-20240221-en
General
-
Target
a23f6d59122dd58976617e18c50f52f5.exe
-
Size
57KB
-
MD5
a23f6d59122dd58976617e18c50f52f5
-
SHA1
7d5bbb755d003eacde0dfd5e606d80170e72b5ab
-
SHA256
d05c8c55e1bafffb5de10d023bd5e516727c14cbb3b0180c7a736c1373d4d2b3
-
SHA512
9e7797874dcb6543eeb0ca457d9f097ee7fd216afa19428466b00b26a2c21112432b6faa750ba7cfc1504df0fbe4d47d637b74ba57c08590626d4a707c6ed05c
-
SSDEEP
1536:KHDii962NpgxTO1dI/6CwvUKyR7lHqIkc3KChGFK+9:KxVNp0C7IX7hqIkQfzu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5032 a23f6d59122dd58976617e18c50f52f5.exe -
Executes dropped EXE 1 IoCs
pid Process 5032 a23f6d59122dd58976617e18c50f52f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 616 a23f6d59122dd58976617e18c50f52f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 616 a23f6d59122dd58976617e18c50f52f5.exe 5032 a23f6d59122dd58976617e18c50f52f5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 616 wrote to memory of 5032 616 a23f6d59122dd58976617e18c50f52f5.exe 89 PID 616 wrote to memory of 5032 616 a23f6d59122dd58976617e18c50f52f5.exe 89 PID 616 wrote to memory of 5032 616 a23f6d59122dd58976617e18c50f52f5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23f6d59122dd58976617e18c50f52f5.exe"C:\Users\Admin\AppData\Local\Temp\a23f6d59122dd58976617e18c50f52f5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\a23f6d59122dd58976617e18c50f52f5.exeC:\Users\Admin\AppData\Local\Temp\a23f6d59122dd58976617e18c50f52f5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5ed9ba5c6a959424683752593945edf10
SHA1f31245244452565907efa218bffb147945b6f978
SHA25698bed94c26b0f216abd4d8fe95681d1bbe7aa6107062a27b6ce6e46ee40725a1
SHA5120ff52d9a2907b1b8483cad62d924e048e36abf0ac75a14eaa5c3f03c29b830688a6a07d056c91c0c734f6ac1cd55a24ca7201aede7047cf51c9f70003e9d2cf4