Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 10:20
Behavioral task
behavioral1
Sample
992ba5fb1e4e04201f07a6cbb49180d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
992ba5fb1e4e04201f07a6cbb49180d5.exe
Resource
win10v2004-20231215-en
General
-
Target
992ba5fb1e4e04201f07a6cbb49180d5.exe
-
Size
2.7MB
-
MD5
992ba5fb1e4e04201f07a6cbb49180d5
-
SHA1
3c3840318aea42aa57f15f061bd73c0877118695
-
SHA256
ceaae03c0d028a8049e2b393042d4dc1fc1dd9d63a7e8388ad9e22ffedf0db08
-
SHA512
a12e9f8a45a3bf924387a66645d812ae3d8e33f78a38fbb02b654a91a94d981e3426ee50bd4d50f686229254dfd9fc78f479ea9943b6c2eeb5771ee1037cbd84
-
SSDEEP
49152:QmeaAGFsHG1o+cH78xmCVJmnNM0MPaiiZFm5j4fwKap:QIAGFb1r2wHvUTr4Mep
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 992ba5fb1e4e04201f07a6cbb49180d5.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 992ba5fb1e4e04201f07a6cbb49180d5.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe -
resource yara_rule behavioral1/memory/2256-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b00000001226e-10.dat upx behavioral1/memory/2420-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe 2420 992ba5fb1e4e04201f07a6cbb49180d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2420 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe 28 PID 2256 wrote to memory of 2420 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe 28 PID 2256 wrote to memory of 2420 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe 28 PID 2256 wrote to memory of 2420 2256 992ba5fb1e4e04201f07a6cbb49180d5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\992ba5fb1e4e04201f07a6cbb49180d5.exe"C:\Users\Admin\AppData\Local\Temp\992ba5fb1e4e04201f07a6cbb49180d5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\992ba5fb1e4e04201f07a6cbb49180d5.exeC:\Users\Admin\AppData\Local\Temp\992ba5fb1e4e04201f07a6cbb49180d5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD56188772d51fe61af125e792436769bca
SHA1b1dcbf590cae1ccd77e3508bec8d216c7394128e
SHA2560a8385e575dc4664f3bfe5a8fa74c5a14efafeede3ae45ff8c873134daa20f58
SHA5124a0e684dfbf7f8dee4be1601fad09c9a3300e4b6e6a97bf903d71772196e847641ffee8ad90e90add2f5ef11f0b0b04d462ba393d222898d8f84d1c01301342d