Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 12:42
Behavioral task
behavioral1
Sample
a1e435c76abfd2a7878dd9795ce1041b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1e435c76abfd2a7878dd9795ce1041b.exe
Resource
win10v2004-20240221-en
General
-
Target
a1e435c76abfd2a7878dd9795ce1041b.exe
-
Size
1.5MB
-
MD5
a1e435c76abfd2a7878dd9795ce1041b
-
SHA1
3702ea75f4da6edc2de775c6e1fa33e0bfff69c0
-
SHA256
176e100d9ecb7f58cfe91bdb6cad0fc928c3e9fd13d2f6bc36e51be16c79aa95
-
SHA512
ebcf0159c3046260def578e27c1966e43570e3e2531fede91b5b16b33bb9be4a1dd3d3626ba4344c99d95061601f36b0abe9757c7a7191d66e329608f18993fd
-
SSDEEP
24576:6ua7HyR0MEdaWUYsadT60EnOHJqa+7TNqhT4Fn+cE6N/bXRpWkvEW:6ueHHM0xU2dACqa+Ny4EcEy/bXisE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 a1e435c76abfd2a7878dd9795ce1041b.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 a1e435c76abfd2a7878dd9795ce1041b.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 a1e435c76abfd2a7878dd9795ce1041b.exe -
resource yara_rule behavioral1/memory/1660-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000800000001227d-10.dat upx behavioral1/memory/1940-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 a1e435c76abfd2a7878dd9795ce1041b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1660 a1e435c76abfd2a7878dd9795ce1041b.exe 1940 a1e435c76abfd2a7878dd9795ce1041b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1940 1660 a1e435c76abfd2a7878dd9795ce1041b.exe 28 PID 1660 wrote to memory of 1940 1660 a1e435c76abfd2a7878dd9795ce1041b.exe 28 PID 1660 wrote to memory of 1940 1660 a1e435c76abfd2a7878dd9795ce1041b.exe 28 PID 1660 wrote to memory of 1940 1660 a1e435c76abfd2a7878dd9795ce1041b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe"C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exeC:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD59c7526a4c9e3483ed99158da8d658912
SHA18cef8daf90e2d79dddd3b87f79dfaacf2924ac4e
SHA256a8250521ec1e795b8dbeef648731bd3651f6edbf2096f4957cbccffe9456768a
SHA512ed142359a0c116fad67731bae58cdcd318307a1c47305f130a38a3010a300ae4d127c23cc4a7021c45ae7c832998b435fb1d87197998a69243925c8236be9dff