Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
dfe182517a87fa581c1cbe91177b43c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfe182517a87fa581c1cbe91177b43c8.exe
Resource
win10v2004-20240226-en
General
-
Target
dfe182517a87fa581c1cbe91177b43c8.exe
-
Size
82KB
-
MD5
dfe182517a87fa581c1cbe91177b43c8
-
SHA1
1020b5019f40763653e6b73de949d0c65337192a
-
SHA256
9876dd9d751a5af9e5c572f79b56f613ed71db7b273256b2c2be2e325567a9ca
-
SHA512
4dd1c6d1ded36652d0cd08f852c7d70de67301682d212083982085dab7d2395ca174f9178ecde209e37756830c6872b89700c105213846e70f4ef08fa106c56a
-
SSDEEP
1536:BH5bgPluEYI4cpoag73CBxFMEci4t2wao9pVg50kjMSMFZuEcHE:BHyM1IFpTYC+Q4t2wv9LhSGuvHE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3824 dfe182517a87fa581c1cbe91177b43c8.exe -
Executes dropped EXE 1 IoCs
pid Process 3824 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4260 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4260 dfe182517a87fa581c1cbe91177b43c8.exe 3824 dfe182517a87fa581c1cbe91177b43c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3824 4260 dfe182517a87fa581c1cbe91177b43c8.exe 88 PID 4260 wrote to memory of 3824 4260 dfe182517a87fa581c1cbe91177b43c8.exe 88 PID 4260 wrote to memory of 3824 4260 dfe182517a87fa581c1cbe91177b43c8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe"C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exeC:\Users\Admin\AppData\Local\Temp\dfe182517a87fa581c1cbe91177b43c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5012d384f8015d78adcb3e40671e69cff
SHA1a631b964d2e646d36b6956ff0e991f6be284a02a
SHA25645309feb830c41b299364b4ff7ad2f70aab8536bfcdcbbe7894376b0d7d5d076
SHA5123dcb64ec0e148a10f515b90fea807e001e9a0d26727e33c927113d0daed5484e677f13ecb43148a794a746ac5daa0c684872558668499e8279d1a9652b6fddf7