Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 11:06
Behavioral task
behavioral1
Sample
abbb6d6f3329d683cea02509bbd1a6dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abbb6d6f3329d683cea02509bbd1a6dd.exe
Resource
win10v2004-20240226-en
General
-
Target
abbb6d6f3329d683cea02509bbd1a6dd.exe
-
Size
1.3MB
-
MD5
abbb6d6f3329d683cea02509bbd1a6dd
-
SHA1
e51e0fa1d6de0078a04572076c8fb22c77fd93b9
-
SHA256
9d47106f0ab37bf0a8cf0bb806affb50f36e4b28cb38785183e4688f25170a9d
-
SHA512
8ab4e5aef5263e6b8c859f42ed9435fa8780036b7cf539876902cd74d4c6637f672ac61920225bb4c77e78ff48ddac4057c99c41b7d479e6e6217f203b76f9f6
-
SSDEEP
24576:cpsoN3reSGA5Qlk+iLTX4ZV+CgyL3ANLpHn6ktItTxNvG:c/eu+inX4ZwCX4HhQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1172 abbb6d6f3329d683cea02509bbd1a6dd.exe -
Executes dropped EXE 1 IoCs
pid Process 1172 abbb6d6f3329d683cea02509bbd1a6dd.exe -
resource yara_rule behavioral2/memory/3528-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000001e59e-12.dat upx behavioral2/memory/1172-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3528 abbb6d6f3329d683cea02509bbd1a6dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3528 abbb6d6f3329d683cea02509bbd1a6dd.exe 1172 abbb6d6f3329d683cea02509bbd1a6dd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1172 3528 abbb6d6f3329d683cea02509bbd1a6dd.exe 86 PID 3528 wrote to memory of 1172 3528 abbb6d6f3329d683cea02509bbd1a6dd.exe 86 PID 3528 wrote to memory of 1172 3528 abbb6d6f3329d683cea02509bbd1a6dd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\abbb6d6f3329d683cea02509bbd1a6dd.exe"C:\Users\Admin\AppData\Local\Temp\abbb6d6f3329d683cea02509bbd1a6dd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\abbb6d6f3329d683cea02509bbd1a6dd.exeC:\Users\Admin\AppData\Local\Temp\abbb6d6f3329d683cea02509bbd1a6dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55102af2e225bcccdadb5b4af187d8ea3
SHA11624434363a3b72aab4a0f366ed601c20f6033d8
SHA256fe1c78dfa0057849306ea28d9fdffcbedf992ebf6bf6d0a9c35da54dee190fdd
SHA512571ea1dd97fda1de759fa126e3dfac74c0f268818de3529eea1387c51e6007283187322529f958d0e47c229588b05b69a519d9f9487da58798fc964d837f2d28