Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
41bafd236ec7a9748a708496acb77988.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41bafd236ec7a9748a708496acb77988.exe
Resource
win10v2004-20231222-en
General
-
Target
41bafd236ec7a9748a708496acb77988.exe
-
Size
82KB
-
MD5
41bafd236ec7a9748a708496acb77988
-
SHA1
b488c50839d80a1f25a3adc9b4fcbd57ca08137a
-
SHA256
49e54bc633904cd7ee116442f928193ac417f565f8ed7e3312ea396ec44052ee
-
SHA512
b7f280f48c61087d617304640cf02a570e91d73259bd68c9426c31f108a117709648cd1e4df3eb9a9233f97797d3e5116e18898777b9cc2dc28bd0962cd4e727
-
SSDEEP
1536:mzJaIzOe2MKuxL2i4ghVFc8O0gPidKInR+mixOqzt3:FIzOg7rFNsi/n0Rxx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 41bafd236ec7a9748a708496acb77988.exe -
Executes dropped EXE 1 IoCs
pid Process 2096 41bafd236ec7a9748a708496acb77988.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 41bafd236ec7a9748a708496acb77988.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 41bafd236ec7a9748a708496acb77988.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2080 41bafd236ec7a9748a708496acb77988.exe 2096 41bafd236ec7a9748a708496acb77988.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2096 2080 41bafd236ec7a9748a708496acb77988.exe 29 PID 2080 wrote to memory of 2096 2080 41bafd236ec7a9748a708496acb77988.exe 29 PID 2080 wrote to memory of 2096 2080 41bafd236ec7a9748a708496acb77988.exe 29 PID 2080 wrote to memory of 2096 2080 41bafd236ec7a9748a708496acb77988.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe"C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exeC:\Users\Admin\AppData\Local\Temp\41bafd236ec7a9748a708496acb77988.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2096
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5363981d4297d276126ad7a100bbe83ab
SHA1c260084ee48d5c1ec5b839a3398681cb16a3f3b7
SHA256d8ae17cee09f54a01e481e857f1e265fce35336446e316423a6b1f69ca8dd445
SHA512fc8561d34dec9c9a8ec26e101001e2cc07df50c9d6da383584191e4696d53c88c1a451b85bf67ed04c9003317ad196eaa0b7be82b61b0d35d83d20e0e671a8d8