Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:57
Behavioral task
behavioral1
Sample
b2a8d3fd34544949740db41ac7e94fe4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b2a8d3fd34544949740db41ac7e94fe4.exe
Resource
win10v2004-20231215-en
General
-
Target
b2a8d3fd34544949740db41ac7e94fe4.exe
-
Size
5.3MB
-
MD5
b2a8d3fd34544949740db41ac7e94fe4
-
SHA1
79365ab5f29defac636b08114e875576b4530532
-
SHA256
28ad0323bd7a692b01bbf441a58d0062cbe90aa8de651a7b06883f86dee85d58
-
SHA512
25f88e76d364fc2fcdb4186373bfb511a47e99aa46545acdd944ba29b0775a79207f39045671f7b9ecba3985f63793b21a51ef36e888207f999e702a7d0957ec
-
SSDEEP
98304:SgrEgCA+59SPv64i956mSLMW7QRYZwuSPv64i956mSLMW:xrR/Q9SPv64i95HAMQQRYXSPv64i95Hr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4180 b2a8d3fd34544949740db41ac7e94fe4.exe -
Executes dropped EXE 1 IoCs
pid Process 4180 b2a8d3fd34544949740db41ac7e94fe4.exe -
resource yara_rule behavioral2/memory/4168-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e96f-13.dat upx behavioral2/memory/4180-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4168 b2a8d3fd34544949740db41ac7e94fe4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4168 b2a8d3fd34544949740db41ac7e94fe4.exe 4180 b2a8d3fd34544949740db41ac7e94fe4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4168 wrote to memory of 4180 4168 b2a8d3fd34544949740db41ac7e94fe4.exe 90 PID 4168 wrote to memory of 4180 4168 b2a8d3fd34544949740db41ac7e94fe4.exe 90 PID 4168 wrote to memory of 4180 4168 b2a8d3fd34544949740db41ac7e94fe4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2a8d3fd34544949740db41ac7e94fe4.exe"C:\Users\Admin\AppData\Local\Temp\b2a8d3fd34544949740db41ac7e94fe4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\b2a8d3fd34544949740db41ac7e94fe4.exeC:\Users\Admin\AppData\Local\Temp\b2a8d3fd34544949740db41ac7e94fe4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD583f542d0ec0ca048ee400b76a691aa54
SHA10929539f156027b26ea6ae8e17f2114f1baaa730
SHA256a8ac0904e012d2a7ab5c539bd14c15ec6f549ec33d1a6bb710f09b5b8a348ee7
SHA5124d46b9ccf9f4d96492f24e2266d957e2e04ec85f4bc19d91d9e923b6b2ee84a70a9702fe71ddfdcbe3314361100e669695deb3bfd45b9efb390ac33f583debf1