Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
ad2fad57dd8e68494cc339d24dbcb76a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad2fad57dd8e68494cc339d24dbcb76a.exe
Resource
win10v2004-20240226-en
General
-
Target
ad2fad57dd8e68494cc339d24dbcb76a.exe
-
Size
82KB
-
MD5
ad2fad57dd8e68494cc339d24dbcb76a
-
SHA1
dc1414c69d8c2b2a9ff8d52d2c6b7ca21f6bb837
-
SHA256
a82bc5aa96a73dd515f6a2ecacf7deafc1efcef7153e573e9ed269cf5522b984
-
SHA512
8c13118552d1c0592bb887af1d25bf195201d940af10a5f7c21964685443370aae2c11600907945ac7649a5c59a2b1ede178160731e071d1379f82a18efe15c4
-
SSDEEP
1536:AV1DoLRmFb6eeP2y9/WB2rqqpaLs4C6pcIWL4j52sW8qPCMOur2d3:q6kDkT90qpaLs4CccITjIqM/r21
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1928 ad2fad57dd8e68494cc339d24dbcb76a.exe -
Executes dropped EXE 1 IoCs
pid Process 1928 ad2fad57dd8e68494cc339d24dbcb76a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 ad2fad57dd8e68494cc339d24dbcb76a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 ad2fad57dd8e68494cc339d24dbcb76a.exe 1928 ad2fad57dd8e68494cc339d24dbcb76a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1928 1540 ad2fad57dd8e68494cc339d24dbcb76a.exe 87 PID 1540 wrote to memory of 1928 1540 ad2fad57dd8e68494cc339d24dbcb76a.exe 87 PID 1540 wrote to memory of 1928 1540 ad2fad57dd8e68494cc339d24dbcb76a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad2fad57dd8e68494cc339d24dbcb76a.exe"C:\Users\Admin\AppData\Local\Temp\ad2fad57dd8e68494cc339d24dbcb76a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\ad2fad57dd8e68494cc339d24dbcb76a.exeC:\Users\Admin\AppData\Local\Temp\ad2fad57dd8e68494cc339d24dbcb76a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD510180455c91799848eb1d5eccc75f108
SHA14e8125a3a4d569257f2b6c081610eaccb5d54cec
SHA25658fc351cb9eef4458d211cf57c00e2935fc94032d77a5bb957566a5e32fedfb0
SHA512cba629e21f943f564698ef2d075d7dd89162856ddcf1ef6cdf84a4ecffa6b462f0f8e32d7d553dcfda98fd0a28bcc014d938daf80bf7864159746595e1735166