Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:11
Behavioral task
behavioral1
Sample
b9d82aef7eaab442ec0fa10908f9bcfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b9d82aef7eaab442ec0fa10908f9bcfa.exe
Resource
win10v2004-20231215-en
General
-
Target
b9d82aef7eaab442ec0fa10908f9bcfa.exe
-
Size
133KB
-
MD5
b9d82aef7eaab442ec0fa10908f9bcfa
-
SHA1
4faa836f6d9ffd4f13af7ed0c321dcaa92d2f094
-
SHA256
1de4e780a63f1a4c832a6f4d6716a183f3359951b291d2792e4af9e4574f49b5
-
SHA512
f9e3cef6e92b947f55d4638d6a307e20fd97732539a6a296841422edf1cffce595cb18c6da2a6316b2ed71208ec0299c5f1e2f7b1cff3b41cba4ad4252883f57
-
SSDEEP
3072:8UxtrIlDq0QdLqtBSqQf5KpSrMYOMJQFo7W8I3HfMQ:pxKlDrQdLx75P4YPul9HfMQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 b9d82aef7eaab442ec0fa10908f9bcfa.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 b9d82aef7eaab442ec0fa10908f9bcfa.exe -
resource yara_rule behavioral2/memory/3296-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x000800000001e712-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3296 b9d82aef7eaab442ec0fa10908f9bcfa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3296 b9d82aef7eaab442ec0fa10908f9bcfa.exe 2804 b9d82aef7eaab442ec0fa10908f9bcfa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3296 wrote to memory of 2804 3296 b9d82aef7eaab442ec0fa10908f9bcfa.exe 88 PID 3296 wrote to memory of 2804 3296 b9d82aef7eaab442ec0fa10908f9bcfa.exe 88 PID 3296 wrote to memory of 2804 3296 b9d82aef7eaab442ec0fa10908f9bcfa.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9d82aef7eaab442ec0fa10908f9bcfa.exe"C:\Users\Admin\AppData\Local\Temp\b9d82aef7eaab442ec0fa10908f9bcfa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\b9d82aef7eaab442ec0fa10908f9bcfa.exeC:\Users\Admin\AppData\Local\Temp\b9d82aef7eaab442ec0fa10908f9bcfa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2804
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD58ebe2c7a3dc118638b0641af4a6a4ce9
SHA1600a2f17e03e83a0c816b9772976678510133e9a
SHA256aa015daa74499e9f112cf1bb8078d4607d399dc1e0b3544692fa6ffc6c0261b4
SHA5126db94a46ea76e08b144c4d3688702511af2c5600b63f6df70786ca361f0fa6549bc639278985a86c26895de26b4b921bcf345f37e8ce9a71f96a282c34acb3b2