Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe
Resource
win10v2004-20240508-en
General
-
Target
da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe
-
Size
56KB
-
MD5
a0397a0c05ed52217bcf01242ef5b2ab
-
SHA1
7bbb719b13739e63de2a2d6a9c13cad4b356f63b
-
SHA256
da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e
-
SHA512
cdb100c7ad7be983727bf5947b36d9c848a2a2fc0ed48cdd75c33f82efed5a61d982910096bb895587b0b69aa145af9c5ba3fb4b9d77b220c8503f063e3abf3d
-
SSDEEP
768:ow8CpQS1zB0h8B99ukuwoPwA2VTJK9VFUI/xkHo1ygZS82KueYwwG6zt2jNastu:owCiNTRXVSAtHTgZECYn4jcstu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4504 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe -
Executes dropped EXE 1 IoCs
pid Process 4504 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1976 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1976 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe 4504 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 4504 1976 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe 82 PID 1976 wrote to memory of 4504 1976 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe 82 PID 1976 wrote to memory of 4504 1976 da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe"C:\Users\Admin\AppData\Local\Temp\da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exeC:\Users\Admin\AppData\Local\Temp\da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\da9681b13f6785d67a1ed7321785bcc457c42f2b004dddb83c55f226695a912e.exe
Filesize56KB
MD533335fbf763056006e0b50d4f31f442a
SHA1b5bdca4da99d678e0422173599533ff4d737edf4
SHA2564cdf7c959c2e832c6d19742aac944c31d43e5944c97ce6bb6ed7df977159e6e3
SHA51238475fb7e107b43868ba74b4d51736e9126190223283ce136b80c388d1159a72f8812b83e7c3f8b1783ea35edf6a5f1407b19b3a68d493431a8b413c8773b54c