Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 00:25
Behavioral task
behavioral1
Sample
aa88872bc0454dfc95e9afc41e7f55f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa88872bc0454dfc95e9afc41e7f55f7.exe
Resource
win10v2004-20240226-en
General
-
Target
aa88872bc0454dfc95e9afc41e7f55f7.exe
-
Size
5.8MB
-
MD5
aa88872bc0454dfc95e9afc41e7f55f7
-
SHA1
d2044a474dff36dfff8f96bf246597842f4368f6
-
SHA256
cd9503b3c4ea5398c0d3dc000cd58fa578bd426fc9fd5901eac6930d365e95ef
-
SHA512
902f4f12bb28846eee75cd3f3cfdbb3d5b6899978ea7eb7fbef5cfe618325ca4313d2dd89b1ab811c54f2856dcef7b3e94cd9729137a7d202c67b249c4dd63c2
-
SSDEEP
98304:nphWFakGET3TDFJ7QpIpZyprGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5C:p5lEz1vbyppGhRaaCkN9qHGhRa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe -
resource yara_rule behavioral1/memory/2992-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012255-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe 1972 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1972 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe 28 PID 2992 wrote to memory of 1972 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe 28 PID 2992 wrote to memory of 1972 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe 28 PID 2992 wrote to memory of 1972 2992 aa88872bc0454dfc95e9afc41e7f55f7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe"C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exeC:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5f49f78401981920bc015d50ed17609e0
SHA13c485c8895618b8759dc079c728980b5f70e0e55
SHA256bf956472b2d34985d6da84673be76495963134b50c1eb879762c1341f48c2463
SHA5125c33c21a89a1fc27f3daeaf63170826e96673e5ac8a675a28da4972d417ff2d4e833a475b72b2546c5f1e2512d65e1a54448b8ac99498abdfe34b4f7b4ff881f