Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 09:34
Behavioral task
behavioral1
Sample
a1882445b6e89bf1112354e22f3062c0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1882445b6e89bf1112354e22f3062c0.exe
Resource
win10v2004-20240221-en
General
-
Target
a1882445b6e89bf1112354e22f3062c0.exe
-
Size
2.7MB
-
MD5
a1882445b6e89bf1112354e22f3062c0
-
SHA1
1c6cf8a64b32e255ba0616eb61967be0bf55f88f
-
SHA256
b7118f6cd74d92c5fd06cb11931c161d031e6bd0cfe121b91e831bf1d5ca64c7
-
SHA512
0562e8d8982bab35f3a5a46e509863622edd4d6dc11715e6c67b29f4bcc28f5ece7a88fde57ba4e851260634060369a43834ef6af3af2b3e8f6fa2139d93e9a0
-
SSDEEP
49152:C99FYePL9j9qwVoTD0Cn8AzTIPqkqIreD0nn7CZQdI5+SRVUMU3OJR/:C1j/ikC8AH1sewn2+SjLaOJR
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
a1882445b6e89bf1112354e22f3062c0.exepid process 2956 a1882445b6e89bf1112354e22f3062c0.exe -
Executes dropped EXE 1 IoCs
Processes:
a1882445b6e89bf1112354e22f3062c0.exepid process 2956 a1882445b6e89bf1112354e22f3062c0.exe -
Processes:
resource yara_rule behavioral2/memory/908-0-0x0000000000400000-0x000000000086A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exe upx behavioral2/memory/2956-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a1882445b6e89bf1112354e22f3062c0.exepid process 908 a1882445b6e89bf1112354e22f3062c0.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
a1882445b6e89bf1112354e22f3062c0.exea1882445b6e89bf1112354e22f3062c0.exepid process 908 a1882445b6e89bf1112354e22f3062c0.exe 2956 a1882445b6e89bf1112354e22f3062c0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a1882445b6e89bf1112354e22f3062c0.exedescription pid process target process PID 908 wrote to memory of 2956 908 a1882445b6e89bf1112354e22f3062c0.exe a1882445b6e89bf1112354e22f3062c0.exe PID 908 wrote to memory of 2956 908 a1882445b6e89bf1112354e22f3062c0.exe a1882445b6e89bf1112354e22f3062c0.exe PID 908 wrote to memory of 2956 908 a1882445b6e89bf1112354e22f3062c0.exe a1882445b6e89bf1112354e22f3062c0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exe"C:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exeC:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a1882445b6e89bf1112354e22f3062c0.exeFilesize
2.7MB
MD5844b44326203f024c086440a05cc8313
SHA1d353703b654981b1f288ca7b55db7cf6a711f380
SHA2560001906107c621edd59820731f5cba00ffc8d8e37f24e30ad268de796732b91e
SHA512f3c79480f7e1bca4e0db8e0756b9fa577f309e339df80e007b50ace3e626d7c49f62a97d89e432378f717f5cf9cdc0e4330011baa0a95327f9ebf296e8507513
-
memory/908-0-0x0000000000400000-0x000000000086A000-memory.dmpFilesize
4.4MB
-
memory/908-1-0x0000000001C50000-0x0000000001D62000-memory.dmpFilesize
1.1MB
-
memory/908-2-0x0000000000400000-0x00000000005F2000-memory.dmpFilesize
1.9MB
-
memory/908-13-0x0000000000400000-0x00000000005F2000-memory.dmpFilesize
1.9MB
-
memory/2956-14-0x0000000000400000-0x000000000086A000-memory.dmpFilesize
4.4MB
-
memory/2956-15-0x0000000000400000-0x00000000005F2000-memory.dmpFilesize
1.9MB
-
memory/2956-17-0x0000000001870000-0x0000000001982000-memory.dmpFilesize
1.1MB
-
memory/2956-23-0x0000000000400000-0x000000000086A000-memory.dmpFilesize
4.4MB