Analysis
-
max time kernel
92s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 10:03
Behavioral task
behavioral1
Sample
ab9efe01875976b214bb49e706688406.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab9efe01875976b214bb49e706688406.exe
Resource
win10v2004-20240226-en
General
-
Target
ab9efe01875976b214bb49e706688406.exe
-
Size
59KB
-
MD5
ab9efe01875976b214bb49e706688406
-
SHA1
4c24fd51b73557fc67c3053b3cb7cee47e48e974
-
SHA256
600059923eef2defadc5e6eccc933749f5bea47bbd904581f7d7473692ffec85
-
SHA512
65f02749b07177071e242b515f912898a5831c4d9c848a7cb31b1dc30fc06a41af5f6778e680555d41a924ae2e05ab64f5cf49d475bcdb9308ca39061bd8bd7a
-
SSDEEP
1536:b8l1KlM4NxHW0T5IY5HkW4W3o1h6TKvYg:bTxXHhT5IQUr0K5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4796 ab9efe01875976b214bb49e706688406.exe -
Executes dropped EXE 1 IoCs
pid Process 4796 ab9efe01875976b214bb49e706688406.exe -
resource yara_rule behavioral2/memory/1312-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx behavioral2/memory/4796-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1312 ab9efe01875976b214bb49e706688406.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1312 ab9efe01875976b214bb49e706688406.exe 4796 ab9efe01875976b214bb49e706688406.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4796 1312 ab9efe01875976b214bb49e706688406.exe 91 PID 1312 wrote to memory of 4796 1312 ab9efe01875976b214bb49e706688406.exe 91 PID 1312 wrote to memory of 4796 1312 ab9efe01875976b214bb49e706688406.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9efe01875976b214bb49e706688406.exe"C:\Users\Admin\AppData\Local\Temp\ab9efe01875976b214bb49e706688406.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\ab9efe01875976b214bb49e706688406.exeC:\Users\Admin\AppData\Local\Temp\ab9efe01875976b214bb49e706688406.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD53e7523aa800b07ff163069ce54abf9b2
SHA12e7171329516b4a2a36acfb7dfe06d0abc1bbb84
SHA256cd9894c74a69c24e3d7a8134cbd24cd4279b3d6e70094a785d399d7f1fd7e4b8
SHA512fdfdfa6fcfeb973a0a31074bb38896df481906ba04d30db06877bb596610ef2cb93ed700cf2c2ac41ed216a63cc28e6fbde177177e9aa37f4c81595d9496340c