Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:42
Behavioral task
behavioral1
Sample
a1e435c76abfd2a7878dd9795ce1041b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1e435c76abfd2a7878dd9795ce1041b.exe
Resource
win10v2004-20240221-en
General
-
Target
a1e435c76abfd2a7878dd9795ce1041b.exe
-
Size
1.5MB
-
MD5
a1e435c76abfd2a7878dd9795ce1041b
-
SHA1
3702ea75f4da6edc2de775c6e1fa33e0bfff69c0
-
SHA256
176e100d9ecb7f58cfe91bdb6cad0fc928c3e9fd13d2f6bc36e51be16c79aa95
-
SHA512
ebcf0159c3046260def578e27c1966e43570e3e2531fede91b5b16b33bb9be4a1dd3d3626ba4344c99d95061601f36b0abe9757c7a7191d66e329608f18993fd
-
SSDEEP
24576:6ua7HyR0MEdaWUYsadT60EnOHJqa+7TNqhT4Fn+cE6N/bXRpWkvEW:6ueHHM0xU2dACqa+Ny4EcEy/bXisE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1144 a1e435c76abfd2a7878dd9795ce1041b.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 a1e435c76abfd2a7878dd9795ce1041b.exe -
resource yara_rule behavioral2/memory/2876-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000900000001e5ba-11.dat upx behavioral2/memory/1144-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2876 a1e435c76abfd2a7878dd9795ce1041b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2876 a1e435c76abfd2a7878dd9795ce1041b.exe 1144 a1e435c76abfd2a7878dd9795ce1041b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1144 2876 a1e435c76abfd2a7878dd9795ce1041b.exe 87 PID 2876 wrote to memory of 1144 2876 a1e435c76abfd2a7878dd9795ce1041b.exe 87 PID 2876 wrote to memory of 1144 2876 a1e435c76abfd2a7878dd9795ce1041b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe"C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exeC:\Users\Admin\AppData\Local\Temp\a1e435c76abfd2a7878dd9795ce1041b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD526d639758090a4fa2115db860b700464
SHA1781e2629c948a07583e544809b1b07a56813428a
SHA256361d76945cbf0d732934b28264c180150bb572fc9c03b54a58e2c1dc0dc771be
SHA512461483956180704823e0958f3e2c86048bf807ac352284bcbf9ed662a2fc309e13a34e48221530bdd474ddc188061192b5b01244f0861e0c30fd3b2a6d1d6f1d