Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 10:12
Behavioral task
behavioral1
Sample
dee9927780245873a179f0ac37e2e20f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dee9927780245873a179f0ac37e2e20f.exe
Resource
win10v2004-20240226-en
General
-
Target
dee9927780245873a179f0ac37e2e20f.exe
-
Size
3.9MB
-
MD5
dee9927780245873a179f0ac37e2e20f
-
SHA1
292e6dc6193983f2dc4240fb9ae94cf61d4f1bcd
-
SHA256
3a6fe2e056ccfeead8d38f2347db08d385a087fa8d17f6a8183e5cc10baaff98
-
SHA512
b3bb6bd21f2466c303e7ad4eb68ddc0524f2b0b351b39af74282d0ebc857590a9d0f09cb264c58ee86dcef34f4f195dcc32fd3d68377a8dc6b8a9f1e84e06a00
-
SSDEEP
98304:wgVp7D0Jl4Megg3gnl/IVUt4pJWzZtIygg3gnl/IVUV:wIn0Jl4Mqgl/iwgWttJgl/iG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1632 dee9927780245873a179f0ac37e2e20f.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 dee9927780245873a179f0ac37e2e20f.exe -
Loads dropped DLL 1 IoCs
pid Process 824 dee9927780245873a179f0ac37e2e20f.exe -
resource yara_rule behavioral1/memory/824-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c0000000122f0-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 dee9927780245873a179f0ac37e2e20f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 824 dee9927780245873a179f0ac37e2e20f.exe 1632 dee9927780245873a179f0ac37e2e20f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 1632 824 dee9927780245873a179f0ac37e2e20f.exe 28 PID 824 wrote to memory of 1632 824 dee9927780245873a179f0ac37e2e20f.exe 28 PID 824 wrote to memory of 1632 824 dee9927780245873a179f0ac37e2e20f.exe 28 PID 824 wrote to memory of 1632 824 dee9927780245873a179f0ac37e2e20f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee9927780245873a179f0ac37e2e20f.exe"C:\Users\Admin\AppData\Local\Temp\dee9927780245873a179f0ac37e2e20f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\dee9927780245873a179f0ac37e2e20f.exeC:\Users\Admin\AppData\Local\Temp\dee9927780245873a179f0ac37e2e20f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5b301be73ee0d19fd38a6a8919c7c2d44
SHA145f36f4c9a6261746e424c32302fa79f751d6bde
SHA2562ec9ec895d2177dc8f8766209b30766593d3dd8ae43edaea317f761c43bf9e16
SHA512a02d547673d5f1e67b65755812084efd7594598c38e25666d239975c408181d0f83c156726e1190d480c8b0af8d32ca4c6acd13b8be8f87c49b18a1b88d59d3d