Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 00:25
Behavioral task
behavioral1
Sample
aa88872bc0454dfc95e9afc41e7f55f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa88872bc0454dfc95e9afc41e7f55f7.exe
Resource
win10v2004-20240226-en
General
-
Target
aa88872bc0454dfc95e9afc41e7f55f7.exe
-
Size
5.8MB
-
MD5
aa88872bc0454dfc95e9afc41e7f55f7
-
SHA1
d2044a474dff36dfff8f96bf246597842f4368f6
-
SHA256
cd9503b3c4ea5398c0d3dc000cd58fa578bd426fc9fd5901eac6930d365e95ef
-
SHA512
902f4f12bb28846eee75cd3f3cfdbb3d5b6899978ea7eb7fbef5cfe618325ca4313d2dd89b1ab811c54f2856dcef7b3e94cd9729137a7d202c67b249c4dd63c2
-
SSDEEP
98304:nphWFakGET3TDFJ7QpIpZyprGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5C:p5lEz1vbyppGhRaaCkN9qHGhRa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 aa88872bc0454dfc95e9afc41e7f55f7.exe -
resource yara_rule behavioral2/memory/5284-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e59e-11.dat upx behavioral2/memory/2280-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5284 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5284 aa88872bc0454dfc95e9afc41e7f55f7.exe 2280 aa88872bc0454dfc95e9afc41e7f55f7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5284 wrote to memory of 2280 5284 aa88872bc0454dfc95e9afc41e7f55f7.exe 87 PID 5284 wrote to memory of 2280 5284 aa88872bc0454dfc95e9afc41e7f55f7.exe 87 PID 5284 wrote to memory of 2280 5284 aa88872bc0454dfc95e9afc41e7f55f7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe"C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exeC:\Users\Admin\AppData\Local\Temp\aa88872bc0454dfc95e9afc41e7f55f7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD547ab2a3c1ec6b16126ac6dd76fed9f2a
SHA15ea598ffef692be42e62a3f2a6f71c0bf20a9506
SHA25617a875f4c0804c829d007036163f8c8d3e8f56a9c6f1a71a56d88357c9784ba5
SHA512e33a9faf0121dc4a12da3360ddaedd9acce7f54b6d661b88743d2afa60151b6ba723f24cf2afef15b51c767c563b6e9f52ae32abb8d0cab372fc89119b8965f9