Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
d585d817abdf50dc9a5153f7cc7162cd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d585d817abdf50dc9a5153f7cc7162cd.exe
Resource
win10v2004-20231215-en
General
-
Target
d585d817abdf50dc9a5153f7cc7162cd.exe
-
Size
82KB
-
MD5
d585d817abdf50dc9a5153f7cc7162cd
-
SHA1
04c8c1042c6074be1b9d232c079f77ae93124b89
-
SHA256
be2a5d36952bd15a413df85d326cb992725ff18e740a946b8eb4c8f73a3ecf54
-
SHA512
0e3f403cc14a41eec2758a825136cc3c81b46399e968b37319d95b0862a9c1386a0c3fb9aa9e85ec11ecfcfa27a34eabc8152a933ce85ec5dfb55f0d0634206e
-
SSDEEP
1536:DtuqW+IFrtXy4pnsHMEPnoz2w2SjrhlzxpqVGDIxKaGh5Y060:DYsKxXy4DEPnadjrhwVGza2Zh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 d585d817abdf50dc9a5153f7cc7162cd.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 d585d817abdf50dc9a5153f7cc7162cd.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 d585d817abdf50dc9a5153f7cc7162cd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 d585d817abdf50dc9a5153f7cc7162cd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2756 d585d817abdf50dc9a5153f7cc7162cd.exe 2696 d585d817abdf50dc9a5153f7cc7162cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2696 2756 d585d817abdf50dc9a5153f7cc7162cd.exe 29 PID 2756 wrote to memory of 2696 2756 d585d817abdf50dc9a5153f7cc7162cd.exe 29 PID 2756 wrote to memory of 2696 2756 d585d817abdf50dc9a5153f7cc7162cd.exe 29 PID 2756 wrote to memory of 2696 2756 d585d817abdf50dc9a5153f7cc7162cd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d585d817abdf50dc9a5153f7cc7162cd.exe"C:\Users\Admin\AppData\Local\Temp\d585d817abdf50dc9a5153f7cc7162cd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\d585d817abdf50dc9a5153f7cc7162cd.exeC:\Users\Admin\AppData\Local\Temp\d585d817abdf50dc9a5153f7cc7162cd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD510a3a5b19b3031d37589d21a4b739d89
SHA1d7be2bb2db9ecdb9853f90401b398db78830f6a2
SHA2569f6e6a3d4a8829e2e02a8580684a5430d0acadbf640d914941fce1e59bb25029
SHA512380158bc55f2db039d6252d96b5334ba566a9316cb87dfbb5680bc8e85cbd4c06504ee174832feccf3d75870e89dd9b9947b4626c53a301493e8753f6aeab963