Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe
Resource
win10v2004-20240226-en
General
-
Target
48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe
-
Size
220KB
-
MD5
5dbe3c2f7d155eb508de1a5e65361588
-
SHA1
eb9f0e8081385f3ecf962421968f8c737131b1ad
-
SHA256
48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c
-
SHA512
cbeffe694eb632aa07100468632c55b9c7b51976124e3b01d7b2c26e320632d146c50b80782ffa91a436e3da1681dad4f21dd05da8eff28eff2e067d18d632f5
-
SSDEEP
3072:wZGb1+adM+Bl7g1VjUa0uN+NKvHu8bvjmfyabPdAtoOQyaw9nDTwK+fxVOiwB:wwh+aGE8hUa0uNVz7mfNPc1T9nHw/VC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2504 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2504 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2504 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe 29 PID 2352 wrote to memory of 2504 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe 29 PID 2352 wrote to memory of 2504 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe 29 PID 2352 wrote to memory of 2504 2352 48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe"C:\Users\Admin\AppData\Local\Temp\48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exeC:\Users\Admin\AppData\Local\Temp\48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\48f560dae2bdd498282bebf0d9f63a9c0a699467b13892ab789aefdd6c00473c.exe
Filesize220KB
MD5fdd94667de4ceb4dbb4ddbc104b49adf
SHA13863039787d958739a1933d75df19f46ed75a967
SHA2562284b73fd2f2199dd9f6f1a74b42c2524b95abb099955f9f8a6f84bca4736282
SHA5129f798a6a0eeb32c07a2c7d3d6728a8630e24f3b07cac95a93b9f0f0bf8296889e555a3f16d0eaadacf460a2f2776887ffbfa44678de3b6ede629f3372a56e5f7