Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 17:38
Behavioral task
behavioral1
Sample
a9c248f70b9326f2f5e81f85104c92ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9c248f70b9326f2f5e81f85104c92ad.exe
Resource
win10v2004-20240226-en
General
-
Target
a9c248f70b9326f2f5e81f85104c92ad.exe
-
Size
5.3MB
-
MD5
a9c248f70b9326f2f5e81f85104c92ad
-
SHA1
9555fdcfdb6cbaa11ecbcfbfb17681d9052a09e0
-
SHA256
6fecbeaee12e0d8c6e51129c87fb48dd34922d2b81370521f32d46e6e0f23e47
-
SHA512
891917cdcf33e9f88f5492c5b7098958af9d675fedc15c618a4151e27860d78b7238f056cb3549e3f6a50136ba41bd234471ca581f9cbdc3349846a55caf08bd
-
SSDEEP
98304:ZjYlVQJZgloc2IZ1Q8tfYuZ0GiH+jO2IZ1Q8tfY:ZIUS+cpZdw00G4pZdw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1380 a9c248f70b9326f2f5e81f85104c92ad.exe -
Executes dropped EXE 1 IoCs
pid Process 1380 a9c248f70b9326f2f5e81f85104c92ad.exe -
resource yara_rule behavioral2/memory/3124-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0011000000023148-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3124 a9c248f70b9326f2f5e81f85104c92ad.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3124 a9c248f70b9326f2f5e81f85104c92ad.exe 1380 a9c248f70b9326f2f5e81f85104c92ad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3124 wrote to memory of 1380 3124 a9c248f70b9326f2f5e81f85104c92ad.exe 92 PID 3124 wrote to memory of 1380 3124 a9c248f70b9326f2f5e81f85104c92ad.exe 92 PID 3124 wrote to memory of 1380 3124 a9c248f70b9326f2f5e81f85104c92ad.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c248f70b9326f2f5e81f85104c92ad.exe"C:\Users\Admin\AppData\Local\Temp\a9c248f70b9326f2f5e81f85104c92ad.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\a9c248f70b9326f2f5e81f85104c92ad.exeC:\Users\Admin\AppData\Local\Temp\a9c248f70b9326f2f5e81f85104c92ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD57a1f98d3a58b7dcdbe73c77bda0746d7
SHA11fdcc2f9d0e11df4ab1661841ea72454f01e8ad8
SHA256bb2d157bb111db337c010d2700864bf3be9f978391dcf73c416fc9b88918ad0d
SHA5120759984ecc8ff2c2a214c4e947b022f0f1ff37842da8700db4e22432cf5d63ebcf9a0fb2a7d3636748429346251d723947e36cbc6b64bc98a231734ea6958cdf