Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 03:11

General

  • Target

    aadaa40df816039f1005afe38d290725.exe

  • Size

    82KB

  • MD5

    aadaa40df816039f1005afe38d290725

  • SHA1

    acf9da779bf66bb45ec8e47b14f6cf03a3b8e10b

  • SHA256

    c4174a06279b6e05cbb93b63bc8fb3447f7d5ca9c91461de64105e84c1fcd33c

  • SHA512

    855fd981b8c12d2a88a266a2996a500fc80fdca4e29e7ae506c763b0baf964ce443a1b799619592ff8aed9001a95ef2453cbaf73be4ed4b8cc763dc268a8d20c

  • SSDEEP

    1536:4piy6Iy2L5ZZfG/qgUcYmhdzuXDrBkIyeZ9GIfPGWFBNO/NqKSkBTzJsDUXYf2l:4piyh5Zc/F0mhdzu2ezlPRTg/NJzBTzN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe
    "C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe
      C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe

    Filesize

    82KB

    MD5

    3feb6dafe006d70c54a3c8467b27b305

    SHA1

    26c0435ac96fbe7a87c680aad61ff438c314be2b

    SHA256

    bb5fc7ea3aca4423c2ad9b50861aeff9ff94c530c108716177b086996c13c02c

    SHA512

    8c526d63686790d75cc74ffa7adc645a67f6d93d49cb4317742086b4dc7b7448bb34070a9bb0e1e0ddccc762f769e4178666032aa7421d7be23ac923be02e4b0

  • memory/1448-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1448-1-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/1448-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1448-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4684-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4684-14-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/4684-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4684-25-0x00000000014D0000-0x00000000014EB000-memory.dmp

    Filesize

    108KB