Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 06:40
Behavioral task
behavioral1
Sample
ab3f8c1fe61c257eef0e3382cd8d46ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab3f8c1fe61c257eef0e3382cd8d46ec.exe
Resource
win10v2004-20240226-en
General
-
Target
ab3f8c1fe61c257eef0e3382cd8d46ec.exe
-
Size
1.3MB
-
MD5
ab3f8c1fe61c257eef0e3382cd8d46ec
-
SHA1
3bd43571ffae4de66ed3fea724de446c63d3e5b2
-
SHA256
49d8aecc6196f3dc214973fdffea9ded711aa7605a005114a3fe6a703586bb04
-
SHA512
97cadd7e9e8e4213ac984bb65aef1c9725158390f8bfa04c58d6feca2f81a4cd76e4dadf5e7ad59417b3905c1e17e417c40820e63376813a18977625501cd145
-
SSDEEP
24576:DMGu83QbHT9rMV2RghMroUyKdK2UzV8LQ2BlJhoqyzwdvG:DM1nbHuV25cU82Ux81iqIw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 ab3f8c1fe61c257eef0e3382cd8d46ec.exe -
Executes dropped EXE 1 IoCs
pid Process 1932 ab3f8c1fe61c257eef0e3382cd8d46ec.exe -
resource yara_rule behavioral2/memory/4616-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000800000002325a-11.dat upx behavioral2/memory/1932-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 ab3f8c1fe61c257eef0e3382cd8d46ec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4616 ab3f8c1fe61c257eef0e3382cd8d46ec.exe 1932 ab3f8c1fe61c257eef0e3382cd8d46ec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1932 4616 ab3f8c1fe61c257eef0e3382cd8d46ec.exe 97 PID 4616 wrote to memory of 1932 4616 ab3f8c1fe61c257eef0e3382cd8d46ec.exe 97 PID 4616 wrote to memory of 1932 4616 ab3f8c1fe61c257eef0e3382cd8d46ec.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3f8c1fe61c257eef0e3382cd8d46ec.exe"C:\Users\Admin\AppData\Local\Temp\ab3f8c1fe61c257eef0e3382cd8d46ec.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\ab3f8c1fe61c257eef0e3382cd8d46ec.exeC:\Users\Admin\AppData\Local\Temp\ab3f8c1fe61c257eef0e3382cd8d46ec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5810eb5e026e1ce8d49bbe9f9117d666f
SHA14598e7749c9bb079c12436bc7b7d38c22e4520d1
SHA25683f24d63326173a557eff183c1ae798c9d72345c6135b3f28baa86767aec9360
SHA512f8ef29bf22bca4a94ea4bd6db2e0f609cb5a23dee92cfe7e8bede5f2b4b959bf2b4c1e8af27108991d7194bd2ddfa2af82def567e763b27073255bfe9b17ed96