Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:57
Behavioral task
behavioral1
Sample
b2d8006da81eb0d5bedbcd3aeb06665c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b2d8006da81eb0d5bedbcd3aeb06665c.exe
Resource
win10v2004-20231215-en
General
-
Target
b2d8006da81eb0d5bedbcd3aeb06665c.exe
-
Size
2.7MB
-
MD5
b2d8006da81eb0d5bedbcd3aeb06665c
-
SHA1
24aa27df008dcd64a76a00f7e8f8f5d19cee7163
-
SHA256
a97ae55b6ec89dfd1f4164cf66f07ae8a34d45dddb5bcb343fbc2fda95f1c9c3
-
SHA512
86eaab00d95275ead5f4b7ec97f7d30405f5b195b10377301c106edaa027c5eac185d57e736eb5af895d7d27d98af72c90d6966753643b9cc99574e4cad77694
-
SSDEEP
49152:actRfsfRgsP+uu4Pg+PElR5Rb1+IJQ7ahgOTL/P73:LtR7uxPg+8lRX1JQmh/7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1744 b2d8006da81eb0d5bedbcd3aeb06665c.exe -
Executes dropped EXE 1 IoCs
pid Process 1744 b2d8006da81eb0d5bedbcd3aeb06665c.exe -
resource yara_rule behavioral2/memory/1564-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0007000000023222-13.dat upx behavioral2/memory/1744-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1564 b2d8006da81eb0d5bedbcd3aeb06665c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1564 b2d8006da81eb0d5bedbcd3aeb06665c.exe 1744 b2d8006da81eb0d5bedbcd3aeb06665c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1744 1564 b2d8006da81eb0d5bedbcd3aeb06665c.exe 88 PID 1564 wrote to memory of 1744 1564 b2d8006da81eb0d5bedbcd3aeb06665c.exe 88 PID 1564 wrote to memory of 1744 1564 b2d8006da81eb0d5bedbcd3aeb06665c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2d8006da81eb0d5bedbcd3aeb06665c.exe"C:\Users\Admin\AppData\Local\Temp\b2d8006da81eb0d5bedbcd3aeb06665c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\b2d8006da81eb0d5bedbcd3aeb06665c.exeC:\Users\Admin\AppData\Local\Temp\b2d8006da81eb0d5bedbcd3aeb06665c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD5728ee06d9cf610ac839e7f633e50dee3
SHA13d8cd548e399e52b55e734c5bb32dde1ea2e78a3
SHA2567d7f40d63b506357651337caf7c5a2b3392672ef4f61bfe7487c0b52d41a6002
SHA5124ca008f321c02e5c5d144f0b4f97af0b5c3638db2e661c438454eecb66b32fa40fb2567a6835d66817495f56b4fcfbcb6d109cf3f8549a897b3cc4dc9adee8ed