Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 19:39
Behavioral task
behavioral1
Sample
d6f45dcd33808848254bf923bed1cccc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6f45dcd33808848254bf923bed1cccc.exe
Resource
win10v2004-20240226-en
General
-
Target
d6f45dcd33808848254bf923bed1cccc.exe
-
Size
5.3MB
-
MD5
d6f45dcd33808848254bf923bed1cccc
-
SHA1
8759adea93447fa800ea20cbba3ce5c57311f072
-
SHA256
a1d65a48938979163a12bdd6ff8cd899803abd125cea78501c7400e181716bcb
-
SHA512
f9986d7aff5e5b1f52a447ea6987ce3f5f9b25bb0516888cdd7229a0f9ac1e8cdf8ae508cac5490a99fbcba89337d9a674e85bbb40b6e60891021e27e3fc01b0
-
SSDEEP
98304:zFlP/XSPv64i956mSLMWONsgjrKUuSPv64i956mSLMW:ZdXSPv64i95HAM5KXSPv64i95HAM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 d6f45dcd33808848254bf923bed1cccc.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 d6f45dcd33808848254bf923bed1cccc.exe -
resource yara_rule behavioral2/memory/4356-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e5eb-12.dat upx behavioral2/memory/2992-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4356 d6f45dcd33808848254bf923bed1cccc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4356 d6f45dcd33808848254bf923bed1cccc.exe 2992 d6f45dcd33808848254bf923bed1cccc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4356 wrote to memory of 2992 4356 d6f45dcd33808848254bf923bed1cccc.exe 89 PID 4356 wrote to memory of 2992 4356 d6f45dcd33808848254bf923bed1cccc.exe 89 PID 4356 wrote to memory of 2992 4356 d6f45dcd33808848254bf923bed1cccc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6f45dcd33808848254bf923bed1cccc.exe"C:\Users\Admin\AppData\Local\Temp\d6f45dcd33808848254bf923bed1cccc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\d6f45dcd33808848254bf923bed1cccc.exeC:\Users\Admin\AppData\Local\Temp\d6f45dcd33808848254bf923bed1cccc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD54889c631340fab8098887c6b5888af6a
SHA1b6acfbd5a28f44302ab082ffb60aa3ae820ad9e6
SHA256d8751015128c7092af8b09db44d7e662fe92cfadb3d5238536a0f56f3960f814
SHA51242bea28a5be74678a6110878a1406e1a8c1cf9e26670d683e0cc872b4ef566c7d6602cd1773c64a12733addff0df11c53c998cf1f540d367cdbc8c3e02dcdf7a