Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:31
Behavioral task
behavioral1
Sample
aaa8be22a71fe7e378f46fe37a1cfa18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aaa8be22a71fe7e378f46fe37a1cfa18.exe
Resource
win10v2004-20240226-en
General
-
Target
aaa8be22a71fe7e378f46fe37a1cfa18.exe
-
Size
108KB
-
MD5
aaa8be22a71fe7e378f46fe37a1cfa18
-
SHA1
f5c803fa0595de45fbe92b0130bd568b0a9e9383
-
SHA256
cb75e7d9f14aa663e44c0e0748b048e3dd848c3757cf9aeb028d0eaeea85ecfe
-
SHA512
148036e1cd7b82acd5e2a8d6b0f14172398cf48341e82091c9f5a823548caced2e3ebfd956b8dd9aa21a59ae03620cc58ee5ff43a7cc04242c23c7cc4b5d661b
-
SSDEEP
3072:seCeD/Fp9FYt8+C385L72XNX0FoX1Qmkdqo/8P:P/FzFYfCM5L6NNX1QmkdqoW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4424 apocalyps32.exe -
resource yara_rule behavioral2/memory/2412-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x000900000001e59e-3.dat upx behavioral2/memory/2412-4-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4424-7-0x0000000040010000-0x000000004004B000-memory.dmp upx behavioral2/memory/4424-10-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe aaa8be22a71fe7e378f46fe37a1cfa18.exe File opened for modification C:\Windows\apocalyps32.exe aaa8be22a71fe7e378f46fe37a1cfa18.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4424 2412 aaa8be22a71fe7e378f46fe37a1cfa18.exe 88 PID 2412 wrote to memory of 4424 2412 aaa8be22a71fe7e378f46fe37a1cfa18.exe 88 PID 2412 wrote to memory of 4424 2412 aaa8be22a71fe7e378f46fe37a1cfa18.exe 88 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89 PID 4424 wrote to memory of 2264 4424 apocalyps32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa8be22a71fe7e378f46fe37a1cfa18.exe"C:\Users\Admin\AppData\Local\Temp\aaa8be22a71fe7e378f46fe37a1cfa18.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2264
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5aaa8be22a71fe7e378f46fe37a1cfa18
SHA1f5c803fa0595de45fbe92b0130bd568b0a9e9383
SHA256cb75e7d9f14aa663e44c0e0748b048e3dd848c3757cf9aeb028d0eaeea85ecfe
SHA512148036e1cd7b82acd5e2a8d6b0f14172398cf48341e82091c9f5a823548caced2e3ebfd956b8dd9aa21a59ae03620cc58ee5ff43a7cc04242c23c7cc4b5d661b