Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
9b398316cf8af411e02e0a2ba3a3bf39.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b398316cf8af411e02e0a2ba3a3bf39.exe
Resource
win10v2004-20231215-en
General
-
Target
9b398316cf8af411e02e0a2ba3a3bf39.exe
-
Size
220KB
-
MD5
9b398316cf8af411e02e0a2ba3a3bf39
-
SHA1
20d6ac6b7bb74cedfb6d07947488eee1f9613a62
-
SHA256
190e46bd02682788b551f898680c3731609bbb9520bb3821b236385e09f97f28
-
SHA512
a04338c5fbcccab0968a567159d1ff95660139aaebfa4337cf4e511f286867eee36146b458d27b3669f478cafa7860a3930abc0ab31449883cb6a2992dcee588
-
SSDEEP
3072:LU0SyNp/EsSBZzfVajQ96LgdmwcqzW7Cv2z6kLHFfst0n9IreMEFP8UIQu2YqKcY:VbNhEscl8CDUquBHnQell8UIQiqJfVC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 9b398316cf8af411e02e0a2ba3a3bf39.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 9b398316cf8af411e02e0a2ba3a3bf39.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2672 9b398316cf8af411e02e0a2ba3a3bf39.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2672 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe 29 PID 2364 wrote to memory of 2672 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe 29 PID 2364 wrote to memory of 2672 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe 29 PID 2364 wrote to memory of 2672 2364 9b398316cf8af411e02e0a2ba3a3bf39.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b398316cf8af411e02e0a2ba3a3bf39.exe"C:\Users\Admin\AppData\Local\Temp\9b398316cf8af411e02e0a2ba3a3bf39.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\9b398316cf8af411e02e0a2ba3a3bf39.exeC:\Users\Admin\AppData\Local\Temp\9b398316cf8af411e02e0a2ba3a3bf39.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD57f7d3de7e29bac1d5be7d5ca0ddccf40
SHA18c326c931b6d154624bfd12742d84fc1bc41f37a
SHA256a9b063d161d2d51ab9343702961e9f9e84c2f888778cdcdbaf819145b15330a1
SHA51240e596c9c0f326abf16c98c7739bb210b55ed7f6e44125cc07ed32c884bd92fbc05fa8831d3fcbdffda30dc7629087a1b9913e3fe879f03701e7ed77482c4a12