Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
d4edcfaa1a39558bb7f502adebc7d72b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4edcfaa1a39558bb7f502adebc7d72b.exe
Resource
win10v2004-20240226-en
General
-
Target
d4edcfaa1a39558bb7f502adebc7d72b.exe
-
Size
82KB
-
MD5
d4edcfaa1a39558bb7f502adebc7d72b
-
SHA1
3978f999f6cd66d80b148c4c155ab8701fd3ad80
-
SHA256
b7bcef849abb9e9bdb9b814e3b0384810e3ca2c9ea8affd4560f642bc87361cf
-
SHA512
051a7414b4f1d9ed4b9eb2649522e67942192eaa21486d864a4a97483f2744232fe67a9c4ffaf82e2f0d6f44f88f24e18b7256e040c8956a9cf8c26e1d6380c0
-
SSDEEP
1536:uDJqvKz81POlevDrA63rplRUiBm2hGCVLyIVZoaISx/cKs:Kwx1EeFaqm242zVeaIUcx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2224 d4edcfaa1a39558bb7f502adebc7d72b.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 d4edcfaa1a39558bb7f502adebc7d72b.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe 2224 d4edcfaa1a39558bb7f502adebc7d72b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2224 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe 29 PID 2512 wrote to memory of 2224 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe 29 PID 2512 wrote to memory of 2224 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe 29 PID 2512 wrote to memory of 2224 2512 d4edcfaa1a39558bb7f502adebc7d72b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4edcfaa1a39558bb7f502adebc7d72b.exe"C:\Users\Admin\AppData\Local\Temp\d4edcfaa1a39558bb7f502adebc7d72b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\d4edcfaa1a39558bb7f502adebc7d72b.exeC:\Users\Admin\AppData\Local\Temp\d4edcfaa1a39558bb7f502adebc7d72b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5612f9618490b8b92e35a5c33c77c1739
SHA1a6f176305967ba139341960c7fb6661fbc3c8156
SHA256a6d9e4c2eda21d6f5262512d5989b6f2783431ba33dac6e15d9df1da493ff4ab
SHA512463a97176cd0d994000c65f8f3f42a21039e1b6178ed8b22b1323e55bdd1551f08f09483cc715b4a174683d973c52db7a630ae015d7917d5b620921d129778f6