Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:30
Behavioral task
behavioral1
Sample
8f45f46f90f3e44ec8608dbfdf6bae40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f45f46f90f3e44ec8608dbfdf6bae40.exe
Resource
win10v2004-20231215-en
General
-
Target
8f45f46f90f3e44ec8608dbfdf6bae40.exe
-
Size
1.3MB
-
MD5
8f45f46f90f3e44ec8608dbfdf6bae40
-
SHA1
cd3527a8f8c9ee7d37141dc32becf3cf534156dd
-
SHA256
ac649f22e577ff3795e881b86b6ac69a3ea2110960e32c2ede60fc7b72660b16
-
SHA512
0db3d1f3f88b6a1c34ab559a23fd84f7ee08267712989ed5c5294dd5eedc2a3953ffd382f00db03933ae26479dc9574062cf3d7a6a9e4e718c35e7de24eb6f74
-
SSDEEP
24576:Zf6fyqSKowooryzVCpmeJEs28GhiS+fxTACT7E275T0ApvG:Zf6aqSKqJgJo8Gh/YxdTn75w
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 8f45f46f90f3e44ec8608dbfdf6bae40.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 8f45f46f90f3e44ec8608dbfdf6bae40.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe -
resource yara_rule behavioral1/memory/2404-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000a000000015d70-14.dat upx behavioral1/files/0x000a000000015d70-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe 2672 8f45f46f90f3e44ec8608dbfdf6bae40.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2672 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe 28 PID 2404 wrote to memory of 2672 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe 28 PID 2404 wrote to memory of 2672 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe 28 PID 2404 wrote to memory of 2672 2404 8f45f46f90f3e44ec8608dbfdf6bae40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f45f46f90f3e44ec8608dbfdf6bae40.exe"C:\Users\Admin\AppData\Local\Temp\8f45f46f90f3e44ec8608dbfdf6bae40.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\8f45f46f90f3e44ec8608dbfdf6bae40.exeC:\Users\Admin\AppData\Local\Temp\8f45f46f90f3e44ec8608dbfdf6bae40.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5b8ce7abde80e44e9723e6b9a5456ff52
SHA112446cdcf3619a60553c17f483171f77923a630e
SHA256a7a6f748a841233901d34e743c7e343d0bbaa8967e92cdf5f2df2f6797c97e3b
SHA512edb0cbae2a4f6cbc067a056880dfd54a83991e2fb219d5650e1e87dbc4e60f718b2891bee75b17c76697749728017cd6866725ca3de180dc7684e6dcf70989ea
-
Filesize
385KB
MD5247583a70d96e38daed4fa0cb96ae922
SHA1c202164da33a3db48b4718ad664fd027e2144e5c
SHA2567f3f162241e86b41871cbf411abd47c728487f8430f8ea5c03e9aaa0a0cba1f9
SHA5129f54102a9a35b67184784dc4c187cbe3c878af0469ebe25f7ba47b4cc21fade0dc9d972278b4da69a0cfb43f4bdd185ed6d41794f7f7adf61813006b1e228d86