Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
aadaa40df816039f1005afe38d290725.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aadaa40df816039f1005afe38d290725.exe
Resource
win10v2004-20240226-en
General
-
Target
aadaa40df816039f1005afe38d290725.exe
-
Size
82KB
-
MD5
aadaa40df816039f1005afe38d290725
-
SHA1
acf9da779bf66bb45ec8e47b14f6cf03a3b8e10b
-
SHA256
c4174a06279b6e05cbb93b63bc8fb3447f7d5ca9c91461de64105e84c1fcd33c
-
SHA512
855fd981b8c12d2a88a266a2996a500fc80fdca4e29e7ae506c763b0baf964ce443a1b799619592ff8aed9001a95ef2453cbaf73be4ed4b8cc763dc268a8d20c
-
SSDEEP
1536:4piy6Iy2L5ZZfG/qgUcYmhdzuXDrBkIyeZ9GIfPGWFBNO/NqKSkBTzJsDUXYf2l:4piyh5Zc/F0mhdzu2ezlPRTg/NJzBTzN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4684 aadaa40df816039f1005afe38d290725.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 aadaa40df816039f1005afe38d290725.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1448 aadaa40df816039f1005afe38d290725.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1448 aadaa40df816039f1005afe38d290725.exe 4684 aadaa40df816039f1005afe38d290725.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4684 1448 aadaa40df816039f1005afe38d290725.exe 88 PID 1448 wrote to memory of 4684 1448 aadaa40df816039f1005afe38d290725.exe 88 PID 1448 wrote to memory of 4684 1448 aadaa40df816039f1005afe38d290725.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe"C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exeC:\Users\Admin\AppData\Local\Temp\aadaa40df816039f1005afe38d290725.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD53feb6dafe006d70c54a3c8467b27b305
SHA126c0435ac96fbe7a87c680aad61ff438c314be2b
SHA256bb5fc7ea3aca4423c2ad9b50861aeff9ff94c530c108716177b086996c13c02c
SHA5128c526d63686790d75cc74ffa7adc645a67f6d93d49cb4317742086b4dc7b7448bb34070a9bb0e1e0ddccc762f769e4178666032aa7421d7be23ac923be02e4b0