Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 14:59
Behavioral task
behavioral1
Sample
872d68401392eea1fd94bc7a17dc85c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
872d68401392eea1fd94bc7a17dc85c3.exe
Resource
win10v2004-20231215-en
General
-
Target
872d68401392eea1fd94bc7a17dc85c3.exe
-
Size
2.9MB
-
MD5
872d68401392eea1fd94bc7a17dc85c3
-
SHA1
76332133d28d2bd884580d4c6860cf649377ea15
-
SHA256
7820c820e51ae4a2557d01fccf3d94d662cb1c2c2b5620567e5ba5f91599a976
-
SHA512
66d944de1327161306ac015eb15badf55e22a135071cb4ff5a29eb3107295dc4203a14b53eb0814b02a5246c19034e3d77d0fbdf5e64f716bfc3023947567a8b
-
SSDEEP
49152:J8j379DXa52hYVxX8TpsN74NH5HUyNRcUsCVOzetdZJ:Y3l6xXKps4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 872d68401392eea1fd94bc7a17dc85c3.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 872d68401392eea1fd94bc7a17dc85c3.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 872d68401392eea1fd94bc7a17dc85c3.exe -
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000014534-13.dat upx behavioral1/files/0x000b000000014534-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 872d68401392eea1fd94bc7a17dc85c3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 872d68401392eea1fd94bc7a17dc85c3.exe 2248 872d68401392eea1fd94bc7a17dc85c3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2248 2980 872d68401392eea1fd94bc7a17dc85c3.exe 28 PID 2980 wrote to memory of 2248 2980 872d68401392eea1fd94bc7a17dc85c3.exe 28 PID 2980 wrote to memory of 2248 2980 872d68401392eea1fd94bc7a17dc85c3.exe 28 PID 2980 wrote to memory of 2248 2980 872d68401392eea1fd94bc7a17dc85c3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\872d68401392eea1fd94bc7a17dc85c3.exe"C:\Users\Admin\AppData\Local\Temp\872d68401392eea1fd94bc7a17dc85c3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\872d68401392eea1fd94bc7a17dc85c3.exeC:\Users\Admin\AppData\Local\Temp\872d68401392eea1fd94bc7a17dc85c3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5d84df96426c9fa606631435d8e8db38f
SHA17fe22e6006aadcd984ab712f152550085a83f647
SHA25621cc60f43b5e3a96f34a5d75b3d9a750c32415a9dc33db6be8ee7dd59fee1db6
SHA51252ff1dcaa608a92d0871d8504ba481e2a88202f17ac58c2ffe5cd215532ef9404faee5a6f5ad1e8ea09bf244190b2fc1d9de02207e237c28ce21a1b960262640
-
Filesize
324KB
MD58fc7283e9a331e775e5242011287159a
SHA18185c2809864013539da17be16c8c48fd8456d28
SHA256b2507f9e7eb74265d548e90f78faf5beb9861611956d34337c3859cf706b336b
SHA5126af8ed50d74efbb899930f9b20d63346f66e53e018c261a2c301d598b455da98b8089732985cdb163a55a85fbf40a6f8921b1afb1168fc74210e3a428701e1e4