Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 11:40
Behavioral task
behavioral1
Sample
4e3490adb702ae3b86915ffe269d0e78.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e3490adb702ae3b86915ffe269d0e78.exe
Resource
win10v2004-20231215-en
General
-
Target
4e3490adb702ae3b86915ffe269d0e78.exe
-
Size
2.9MB
-
MD5
4e3490adb702ae3b86915ffe269d0e78
-
SHA1
e8f7a3718cc5397a0fbf6508a68aa9d3c84f6fcb
-
SHA256
6023379efb91da33aaa5280200af8e79a9306ff71aebcfacd4d479878eea1e28
-
SHA512
046a3fbaf288d95a5975351f9ffd138ae3c427c6cd0d4595c8842f5cff20ffbc797f13a4193109e02934b2352efff1cde8d734696a616ec2a35b7a00f1e6f1c3
-
SSDEEP
49152:Gom1VafO9sHd7wwFu58RiN74NH5HUyNRcUsCVOzetdZJ:81V0d7ww0p4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2224 4e3490adb702ae3b86915ffe269d0e78.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 4e3490adb702ae3b86915ffe269d0e78.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 4e3490adb702ae3b86915ffe269d0e78.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000015626-13.dat upx behavioral1/files/0x000a000000015626-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2232 4e3490adb702ae3b86915ffe269d0e78.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2232 4e3490adb702ae3b86915ffe269d0e78.exe 2224 4e3490adb702ae3b86915ffe269d0e78.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2224 2232 4e3490adb702ae3b86915ffe269d0e78.exe 28 PID 2232 wrote to memory of 2224 2232 4e3490adb702ae3b86915ffe269d0e78.exe 28 PID 2232 wrote to memory of 2224 2232 4e3490adb702ae3b86915ffe269d0e78.exe 28 PID 2232 wrote to memory of 2224 2232 4e3490adb702ae3b86915ffe269d0e78.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3490adb702ae3b86915ffe269d0e78.exe"C:\Users\Admin\AppData\Local\Temp\4e3490adb702ae3b86915ffe269d0e78.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\4e3490adb702ae3b86915ffe269d0e78.exeC:\Users\Admin\AppData\Local\Temp\4e3490adb702ae3b86915ffe269d0e78.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD524306c6cb0c05f568e15b6ec6398e011
SHA1472480cf1a2675f8386cdea5fac6736465ae36ef
SHA2566a5bc5b744db37e6c787de0c834a3c2d67b0b4ee449f958ba9ed2c8bf96047cc
SHA5127909ccf9ed5d457fa3865cfff21632ebc46f0e2d31c4ec15b8f8cb3c31ec5a05e7777174167c379c10d8fd9a3117187844d36324dd6ba79f50740db3e4ff57e7
-
Filesize
392KB
MD56f33e2781774da641cd2b535d31beb2c
SHA103594a6d52d1fcff335af885ea2971bd3b28e99b
SHA256ad075f205c171065b42fe54816e60ff1e3b839dd7397d60a9a1bc299c5af7394
SHA5123f788a4dbdd84ca44897f452b36a9dd63a010045fae36f85b6a19817fe7fbb415c0fd29a2071eb9aabb8f44b223a8c28a9d0cfb28fb2bc812317c877d486b649