Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 04:10
Behavioral task
behavioral1
Sample
8e2ec988a4f680a246db7f28aa50dddf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e2ec988a4f680a246db7f28aa50dddf.exe
Resource
win10v2004-20231215-en
General
-
Target
8e2ec988a4f680a246db7f28aa50dddf.exe
-
Size
1.5MB
-
MD5
8e2ec988a4f680a246db7f28aa50dddf
-
SHA1
25a41b951ff5f6752952c3ea5e721ea6fae0b119
-
SHA256
7eb3424fbd9348ec49ba754b03f1c3810bd2f5b39c047646d161747be48023d3
-
SHA512
d8f70af906bdc0a5fcc0d25eb2238a8bae56391c1a5a19b05a68ab40d869cc48b1f04c295a6843615e49b70610aab38994b791f9440290b1e63d382da875acac
-
SSDEEP
24576:YxpUW1KxrEF8QwEqKl0rYZ5MYbUVJtgXNpN67Sw0G+wcextGpPkXWW:YxWW1KxAFtsKWrYZ5FbLs77hc9oW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 8e2ec988a4f680a246db7f28aa50dddf.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 8e2ec988a4f680a246db7f28aa50dddf.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 8e2ec988a4f680a246db7f28aa50dddf.exe -
resource yara_rule behavioral1/memory/1984-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x00050000000120fb-10.dat upx behavioral1/memory/1984-15-0x0000000003510000-0x00000000039FF000-memory.dmp upx behavioral1/memory/2352-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x00050000000120fb-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 8e2ec988a4f680a246db7f28aa50dddf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 8e2ec988a4f680a246db7f28aa50dddf.exe 2352 8e2ec988a4f680a246db7f28aa50dddf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2352 1984 8e2ec988a4f680a246db7f28aa50dddf.exe 28 PID 1984 wrote to memory of 2352 1984 8e2ec988a4f680a246db7f28aa50dddf.exe 28 PID 1984 wrote to memory of 2352 1984 8e2ec988a4f680a246db7f28aa50dddf.exe 28 PID 1984 wrote to memory of 2352 1984 8e2ec988a4f680a246db7f28aa50dddf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2ec988a4f680a246db7f28aa50dddf.exe"C:\Users\Admin\AppData\Local\Temp\8e2ec988a4f680a246db7f28aa50dddf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\8e2ec988a4f680a246db7f28aa50dddf.exeC:\Users\Admin\AppData\Local\Temp\8e2ec988a4f680a246db7f28aa50dddf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD517812afc305b00ab2ad832f643ac1dd1
SHA185339a42adbd1f842a5e2c3af358655085da39da
SHA25637642f79556fa99ac1c775887b6f015b648132906a49ef924776bbbd95443f9f
SHA512a8fd60d83780a4c87cd807cfb53b556f81bdaca66b1c793e7778ede4c67e2aa3ddd04d0bb71ba4e2ee4e6cb1a6486863a41f133c0814d6de8553fccdfcb1e577
-
Filesize
256KB
MD546f4e7868d68cafc9e77d52b7fe114cc
SHA120d20d697d175b66721157650e29b4e21dd84535
SHA256ef3cb675c453c17d76e07252ba728651d37041a613ebb69d312b6ea2953c4007
SHA512ceb5bf2317d75cccc2f44a4d532c76f65ee579f7539c4288613a00db7a1bbe729dade0555f791be5a49c30b0d1a760185c25eecad01d41341e876e865f1cbb86