Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 13:57
Behavioral task
behavioral1
Sample
a2057f37f62f34e875b2a9faee83bd5c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a2057f37f62f34e875b2a9faee83bd5c.exe
Resource
win10v2004-20240221-en
General
-
Target
a2057f37f62f34e875b2a9faee83bd5c.exe
-
Size
1.3MB
-
MD5
a2057f37f62f34e875b2a9faee83bd5c
-
SHA1
bf87558c6d424f03b1eeb8b4bc94045cb20aa085
-
SHA256
0efe2e322060ba8ba39e7e41ef943842944f74c897cd3c98dfb83d81a5cbf276
-
SHA512
4a0cc089fd455ee6142b316d3a3ac8f968aa2706aa6604ac4079ff1d1138125d852e85066994b413cf67f1956ba743160e0cb37c1c15b0b27dc828b091a8bd4a
-
SSDEEP
24576:xnDaUJDe3bBBXsm14atroB9EZsdfHcpewlp01RQoDCEG4JvG:xnbDWbB1smStTEiipeO0duEG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 a2057f37f62f34e875b2a9faee83bd5c.exe -
Executes dropped EXE 1 IoCs
pid Process 2604 a2057f37f62f34e875b2a9faee83bd5c.exe -
Loads dropped DLL 1 IoCs
pid Process 2068 a2057f37f62f34e875b2a9faee83bd5c.exe -
resource yara_rule behavioral1/memory/2068-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000d000000012253-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2068 a2057f37f62f34e875b2a9faee83bd5c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2068 a2057f37f62f34e875b2a9faee83bd5c.exe 2604 a2057f37f62f34e875b2a9faee83bd5c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2604 2068 a2057f37f62f34e875b2a9faee83bd5c.exe 28 PID 2068 wrote to memory of 2604 2068 a2057f37f62f34e875b2a9faee83bd5c.exe 28 PID 2068 wrote to memory of 2604 2068 a2057f37f62f34e875b2a9faee83bd5c.exe 28 PID 2068 wrote to memory of 2604 2068 a2057f37f62f34e875b2a9faee83bd5c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe"C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exeC:\Users\Admin\AppData\Local\Temp\a2057f37f62f34e875b2a9faee83bd5c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b26111f3cc8578ecbfafbd50c462b544
SHA1d2a79c79f1adb7bbbb88d4aa88110eb3ed8a5b2c
SHA256336a1e49ce80da97476417df25ef212955a32b791ab7eb26bbe7c92b77a11695
SHA512086f1698d641dca00aa4a57f166637ae902dd1b29f5a884ab8c048041161c439848e3f73fb7617c002df16e897b16735c2d62ed7a65c978143e32699977e172c