Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 09:51
Behavioral task
behavioral1
Sample
a191f3fa0bfeb45d757a21a36ee46061.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a191f3fa0bfeb45d757a21a36ee46061.exe
Resource
win10v2004-20240221-en
General
-
Target
a191f3fa0bfeb45d757a21a36ee46061.exe
-
Size
11.7MB
-
MD5
a191f3fa0bfeb45d757a21a36ee46061
-
SHA1
b6832415aa4e85b9ee57bc556a3665fa22f740de
-
SHA256
0bee17038baa506186cac46ea76576cedf75c004141fcf61b63e23fd00024876
-
SHA512
e57170a4450ad0bd5fe126f4f10274c4d3ddab0d03a831342f2bd3f388d0afd65dff632267dea128898e244395e5382d1f4429001b1aeb9bb7847ca09e6e297e
-
SSDEEP
98304:QUrzTwZuUV4HBUCczzM3AZXfbGHZ4EMbC/Hthh4HBUCczzM3yLANEkBjVp4HBUCE:FrzTwZKWCcXf3o2WCfuuoWCcXf3o2WC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3116 a191f3fa0bfeb45d757a21a36ee46061.exe -
Executes dropped EXE 1 IoCs
pid Process 3116 a191f3fa0bfeb45d757a21a36ee46061.exe -
resource yara_rule behavioral2/memory/212-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002320c-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 a191f3fa0bfeb45d757a21a36ee46061.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 212 a191f3fa0bfeb45d757a21a36ee46061.exe 3116 a191f3fa0bfeb45d757a21a36ee46061.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 3116 212 a191f3fa0bfeb45d757a21a36ee46061.exe 89 PID 212 wrote to memory of 3116 212 a191f3fa0bfeb45d757a21a36ee46061.exe 89 PID 212 wrote to memory of 3116 212 a191f3fa0bfeb45d757a21a36ee46061.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a191f3fa0bfeb45d757a21a36ee46061.exe"C:\Users\Admin\AppData\Local\Temp\a191f3fa0bfeb45d757a21a36ee46061.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\a191f3fa0bfeb45d757a21a36ee46061.exeC:\Users\Admin\AppData\Local\Temp\a191f3fa0bfeb45d757a21a36ee46061.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD58632b5b3631ca62003a184a9dd386bcb
SHA1e7d638b0ba0c4e9192503d9595838343460b0560
SHA256df94195f393efc5df220fc64dd0da43084e54dac509962068a00ddcdc27467c3
SHA51286f2f6441dc7830ec3301338cff900416eb09413fe7e2ba702b41253776a829e24b06244d0f9ea64a4e5f373290ab59012d37a889212ad312b53eb4587b7eaa3