Analysis
-
max time kernel
135s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 11:16
Behavioral task
behavioral1
Sample
9b877549fab5c2c237286dfd020034be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b877549fab5c2c237286dfd020034be.exe
Resource
win10v2004-20231215-en
General
-
Target
9b877549fab5c2c237286dfd020034be.exe
-
Size
1.3MB
-
MD5
9b877549fab5c2c237286dfd020034be
-
SHA1
6e661643990be503d95e6a143c52c218f1a4bfc8
-
SHA256
7941698296a38a6959ac2ce4d6c2ff5d9d3773a436bf424b99749052fae58cb4
-
SHA512
e806a4bb734988d070dc77bd78240a09008c21f21f54d2e858c7164c1869d36432951bb99611b4c0262a6e3d6d72e980f75e25752135d16ad56f1d98cf3ce83d
-
SSDEEP
24576:ZaYF0a3LfUy821lO/Z64O0vifAFUMqWu7CfNhmbuZCxYU9/9Us:HF0QHHEEHEiEViCH2HR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4548 9b877549fab5c2c237286dfd020034be.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 9b877549fab5c2c237286dfd020034be.exe -
resource yara_rule behavioral2/memory/4432-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0007000000023108-11.dat upx behavioral2/memory/4548-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4432 9b877549fab5c2c237286dfd020034be.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4432 9b877549fab5c2c237286dfd020034be.exe 4548 9b877549fab5c2c237286dfd020034be.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4548 4432 9b877549fab5c2c237286dfd020034be.exe 84 PID 4432 wrote to memory of 4548 4432 9b877549fab5c2c237286dfd020034be.exe 84 PID 4432 wrote to memory of 4548 4432 9b877549fab5c2c237286dfd020034be.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b877549fab5c2c237286dfd020034be.exe"C:\Users\Admin\AppData\Local\Temp\9b877549fab5c2c237286dfd020034be.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\9b877549fab5c2c237286dfd020034be.exeC:\Users\Admin\AppData\Local\Temp\9b877549fab5c2c237286dfd020034be.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD577d6d9fbf96a0068baa3f057e59d0ddd
SHA13d6c08d4c73c4214f581f6e245461528fca35b44
SHA256e045943972782d3fb3e631a58b879ceedfbb0cdea71db4f0ecac89bfedc0f75b
SHA5126b69ed0df61e4df3990f71db05e40f3c2d72aa6705411fc10c9c3a81a6c907a84cccf09fa1a3781168f34d07db6b8f6e086bae1950b1334a878e841d3b0b7e94