Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:55
Behavioral task
behavioral1
Sample
b1baa1153ca04a0264038355f7f42ba4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b1baa1153ca04a0264038355f7f42ba4.exe
Resource
win10v2004-20231215-en
General
-
Target
b1baa1153ca04a0264038355f7f42ba4.exe
-
Size
1.3MB
-
MD5
b1baa1153ca04a0264038355f7f42ba4
-
SHA1
acaa900f96035268e1863392e818a104895e2f44
-
SHA256
747dc92d143e0879bfa893f9ab42975fd5a21e63987efef318cab47c0188d15b
-
SHA512
1665719bd62aff9bee1a0085108d06dc4aca2db46fec6f5978e869a825086f5a9893aaf204c002a4345228f0a63722425d3f5df2bbaadded4f249d5f08395d3e
-
SSDEEP
24576:WoM7WTm7I7LcTQB4aL/AJnsRemFKQAEfftm9CI3ypLjb6PPaAHOdHMU9/9Us:gBsAQBfjEsEcKQA2fA914X6qkeLR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4932 b1baa1153ca04a0264038355f7f42ba4.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 b1baa1153ca04a0264038355f7f42ba4.exe -
resource yara_rule behavioral2/memory/4368-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/memory/4932-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0006000000023210-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4368 b1baa1153ca04a0264038355f7f42ba4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4368 b1baa1153ca04a0264038355f7f42ba4.exe 4932 b1baa1153ca04a0264038355f7f42ba4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4932 4368 b1baa1153ca04a0264038355f7f42ba4.exe 88 PID 4368 wrote to memory of 4932 4368 b1baa1153ca04a0264038355f7f42ba4.exe 88 PID 4368 wrote to memory of 4932 4368 b1baa1153ca04a0264038355f7f42ba4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1baa1153ca04a0264038355f7f42ba4.exe"C:\Users\Admin\AppData\Local\Temp\b1baa1153ca04a0264038355f7f42ba4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\b1baa1153ca04a0264038355f7f42ba4.exeC:\Users\Admin\AppData\Local\Temp\b1baa1153ca04a0264038355f7f42ba4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD5b38eb9738bc7d125d56d7cea6c3f6fbd
SHA1307bb45964f79601a53e615cf1174edadfb458cd
SHA256f499e9dcf64b24ba690791770e26babba5c4b4c6d0dc9534dbcb24452a0bee52
SHA51237c3dc3fce6c485414bac3a269544b8b1bf5b36b49a3937d14ccbae1838c9f316a3a0971749aa7a45ccf2724943bebcf8c44fc4c0493bd1ba34a1a1025a558bb