Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
8b05e62142786be8fb9f98d8e3b8fd15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b05e62142786be8fb9f98d8e3b8fd15.exe
Resource
win10v2004-20231215-en
General
-
Target
8b05e62142786be8fb9f98d8e3b8fd15.exe
-
Size
84KB
-
MD5
8b05e62142786be8fb9f98d8e3b8fd15
-
SHA1
c41e1d4ee728c3652889eec16fba23f3388a5aa4
-
SHA256
56c2ac9996831bd99ab59d984ca352086623683f7244dff61bba870e73a266ce
-
SHA512
bd1a538eed40ae53bafb90ca6ddd91349fa107bbdb6313f9674fe090bc06b7a06efc4894035d76d2d26ad518e6caa482dcedde1a7a9ddfab98d503ebd41f4e29
-
SSDEEP
1536:Lbjhq/UbEDDClPIlLkFlcM7j8b6twTi2CWXJdPxRtHeoY5qST:9q/UbSagM7j2Dm2CcJpVnY5qy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1080 8b05e62142786be8fb9f98d8e3b8fd15.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 8b05e62142786be8fb9f98d8e3b8fd15.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe 1080 8b05e62142786be8fb9f98d8e3b8fd15.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1080 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe 29 PID 2100 wrote to memory of 1080 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe 29 PID 2100 wrote to memory of 1080 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe 29 PID 2100 wrote to memory of 1080 2100 8b05e62142786be8fb9f98d8e3b8fd15.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b05e62142786be8fb9f98d8e3b8fd15.exe"C:\Users\Admin\AppData\Local\Temp\8b05e62142786be8fb9f98d8e3b8fd15.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\8b05e62142786be8fb9f98d8e3b8fd15.exeC:\Users\Admin\AppData\Local\Temp\8b05e62142786be8fb9f98d8e3b8fd15.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD56527247e7bfd3122e19e49c5221d87c1
SHA13d62bdefb8ec2d74eb9da47711fd6d1f11031f34
SHA256543fb9ec3f61407769b79839efe9218642c336ce22b58f9c733f523664bfde7a
SHA51275058b58b267022430ffc464b1a16f357e49ccda11722e26372cd57937035ec40af3f0cd23eb82b578277fb8ce5773750f31b8130dbdff3807abc1128858a1e8