Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 20:33
Behavioral task
behavioral1
Sample
49b250a0be465ceca01e2109f5f47723.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49b250a0be465ceca01e2109f5f47723.exe
Resource
win10v2004-20231215-en
General
-
Target
49b250a0be465ceca01e2109f5f47723.exe
-
Size
11.7MB
-
MD5
49b250a0be465ceca01e2109f5f47723
-
SHA1
85116067ef00f080cc5b0a7f7357655a50bfb50a
-
SHA256
7bef1fc2e950dca86a6def8be86682f804a5786c57f616e4d17959d083665c8c
-
SHA512
d87a0b55f4fe080d243d83bf595a5e4a412d5bce4c405c1f041e61ddd4391ed1e67bd47462387ac03c5b32b8e190545eeee63c52098b73ad17636c771621e812
-
SSDEEP
196608:D8Qlj14jigl/iBiPftLIagl/iBiPEWyE9gl/iBiPftLIagl/iBiP:DfYji2iw5Ia2i7pE92iw5Ia2i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1760 49b250a0be465ceca01e2109f5f47723.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 49b250a0be465ceca01e2109f5f47723.exe -
Loads dropped DLL 1 IoCs
pid Process 1732 49b250a0be465ceca01e2109f5f47723.exe -
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/1760-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012252-14.dat upx behavioral1/files/0x000a000000012252-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1732 49b250a0be465ceca01e2109f5f47723.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1732 49b250a0be465ceca01e2109f5f47723.exe 1760 49b250a0be465ceca01e2109f5f47723.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1760 1732 49b250a0be465ceca01e2109f5f47723.exe 28 PID 1732 wrote to memory of 1760 1732 49b250a0be465ceca01e2109f5f47723.exe 28 PID 1732 wrote to memory of 1760 1732 49b250a0be465ceca01e2109f5f47723.exe 28 PID 1732 wrote to memory of 1760 1732 49b250a0be465ceca01e2109f5f47723.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b250a0be465ceca01e2109f5f47723.exe"C:\Users\Admin\AppData\Local\Temp\49b250a0be465ceca01e2109f5f47723.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\49b250a0be465ceca01e2109f5f47723.exeC:\Users\Admin\AppData\Local\Temp\49b250a0be465ceca01e2109f5f47723.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5bfa1b777ca598650ce1965163ed1240d
SHA1a52fea640d4def8200f65c9bb196e023ab402d3e
SHA2565f8619453992e173f3490af350f76ea1aa002629ab5f934b57ff8c50781fb694
SHA5126a3e21560555d1a729e0bfe48594e4cce134380fb606c8c5fa3349e475cdd5610aac4a076058d8c99d43f16a601d8204312976bee28eaddd06b3aaefa845b9e9
-
Filesize
136KB
MD570d0c3d06927822d734d72d9b4ddb3c0
SHA14ee805dcf2e12ea93963e0d8ac61a5f4d59d68e3
SHA256e155f3b55170353f479ca39640cb3d19cc8db8ef73407752d0d3cd25528cf663
SHA512e8be69823a5b42ceb1f9e6472376c41aa22f67b784a2fa173df59ed5c889cc21318a1af731456e5aa16b5d14dc9460befa57a9b2d5326f2a45e6756953a8583c