Analysis
-
max time kernel
93s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
dfe46b20f14845d0744977d937d912e7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dfe46b20f14845d0744977d937d912e7.exe
Resource
win10v2004-20231215-en
General
-
Target
dfe46b20f14845d0744977d937d912e7.exe
-
Size
82KB
-
MD5
dfe46b20f14845d0744977d937d912e7
-
SHA1
cfb7d8d145e54fc02fc1c25d816061c0093b7982
-
SHA256
52c7326a6a38f0faca74af8756ae55e9ab3bed66df332b8251c04b8d672a78b2
-
SHA512
1b151139217fb8c8d979f8cd3014bf9ccef40befb51e979eb05ba9037df353daafe6b83308e12a08e554c943c547d21cdff0a5287f783cc63ba0bd20c992d609
-
SSDEEP
1536:UJO0UxpYyQgBVA9QD0PjPCMXFoc+/09TbQx/Yx8vEH79OT3W1tXYy5hlY:WWxOiB+QaC3T/kTbgAyvEb4eXYy6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4856 dfe46b20f14845d0744977d937d912e7.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1116 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1116 dfe46b20f14845d0744977d937d912e7.exe 4856 dfe46b20f14845d0744977d937d912e7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4856 1116 dfe46b20f14845d0744977d937d912e7.exe 86 PID 1116 wrote to memory of 4856 1116 dfe46b20f14845d0744977d937d912e7.exe 86 PID 1116 wrote to memory of 4856 1116 dfe46b20f14845d0744977d937d912e7.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe"C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exeC:\Users\Admin\AppData\Local\Temp\dfe46b20f14845d0744977d937d912e7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5462bfed2b83326cd4932aea5fca80f5e
SHA1f55ca26cffca43862b18bf704a42cc54e412061b
SHA25696df4f93e1ec51565df50c9881f45e7e5b48d90ee3858101b2df8e058495b3b1
SHA5122746fcfffb4f0f4bf06aead46ba9d76943c28f1eb25ebcf7ef03bed468f41e735d60ca9acee790e95a1fba5a918a8da8717f3a3c6a1f57692e8843c04e655699