Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 07:35
Behavioral task
behavioral1
Sample
8bc389d06c2cf35b673dac3c1edf08c7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8bc389d06c2cf35b673dac3c1edf08c7.exe
Resource
win10v2004-20231215-en
General
-
Target
8bc389d06c2cf35b673dac3c1edf08c7.exe
-
Size
5.8MB
-
MD5
8bc389d06c2cf35b673dac3c1edf08c7
-
SHA1
1c264ebd376244eea084727f71fd4c79a48815ab
-
SHA256
ef5a1fb1b7ebc7a9c65d2f9593d52e369c8f3d59fa5b48eb9b5d31ded5e49c42
-
SHA512
e9a152043d4de53a636fe8424f0635f320a2cf3ea29a7854ed0509b41e8654ce613ee5b21d11e77c2d9d3dfa2edb85dd477b7b008fdc4822a909504fcb685f5f
-
SSDEEP
98304:TQKBj7xylOV6F9nrHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:cKBjklOV897auq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 8bc389d06c2cf35b673dac3c1edf08c7.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 8bc389d06c2cf35b673dac3c1edf08c7.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe -
resource yara_rule behavioral1/memory/2760-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000013a1a-10.dat upx behavioral1/files/0x000a000000013a1a-13.dat upx behavioral1/memory/3052-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe 3052 8bc389d06c2cf35b673dac3c1edf08c7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3052 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe 28 PID 2760 wrote to memory of 3052 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe 28 PID 2760 wrote to memory of 3052 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe 28 PID 2760 wrote to memory of 3052 2760 8bc389d06c2cf35b673dac3c1edf08c7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bc389d06c2cf35b673dac3c1edf08c7.exe"C:\Users\Admin\AppData\Local\Temp\8bc389d06c2cf35b673dac3c1edf08c7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\8bc389d06c2cf35b673dac3c1edf08c7.exeC:\Users\Admin\AppData\Local\Temp\8bc389d06c2cf35b673dac3c1edf08c7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5cbb0dc29d11ec92d45823ba047f282ae
SHA1b878d30789cf126432230fc4c45c6ff338c07876
SHA25668cfdab4938e6f9f56b4a9f1f06e8bbfb120a3ad5b1771e0a8e018b6c497858b
SHA512be883872aaab3793b9e78c22fbbc5d15c868c68e85e0117f12f12beb0a6fc138b7ff9f0e4542c6dbd2049580c0736a090c69465e1e7e6e049c1da5b42a0380af
-
Filesize
194KB
MD55c4f59c8e0de253a0ad5730fdf25d0c4
SHA1b16d387ef145d9a0f869e58c18c6e923dc5fcb1d
SHA256e69ccae9e490bca3e32f055e40c1cc3bff99953012d92ae708c03e8ff16ec68e
SHA51206daa21433389201d33e0273a511c1635e5c9a4613693afb294ebc658da6c243c240f4078d977e1c16783ccc92c2d7a6a2eebc30fef955dbe1899b1936fd1fc2