Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 14:34
Behavioral task
behavioral1
Sample
ac1e9f04ae7f6389a639734774b1174f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac1e9f04ae7f6389a639734774b1174f.exe
Resource
win10v2004-20240226-en
General
-
Target
ac1e9f04ae7f6389a639734774b1174f.exe
-
Size
1.3MB
-
MD5
ac1e9f04ae7f6389a639734774b1174f
-
SHA1
2316f4f4d78dd7842382bade832a10cab3f360aa
-
SHA256
ba618e4ae8a57957a79380e291d75e7ace9bad6b8a5786fb3ca33790d8dbeb21
-
SHA512
d68b8b7a66d7a0aebbd1a084c4b7fb79a8aace0634018c0538a095b4e9bfc811537aa4d62ea45d18a09e2bc626939d8b09dc7a116b9c85c4520b0ad0a68fbaa5
-
SSDEEP
24576:PwVZvRdN7WQFpRrjDWniDKJdBRRkD4uhjV67lyXN0ESr592TCGvG:c7dEcpRrjDC1JkD4uL67cCJrL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4808 ac1e9f04ae7f6389a639734774b1174f.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 ac1e9f04ae7f6389a639734774b1174f.exe -
resource yara_rule behavioral2/memory/2064-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e9a0-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 ac1e9f04ae7f6389a639734774b1174f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 ac1e9f04ae7f6389a639734774b1174f.exe 4808 ac1e9f04ae7f6389a639734774b1174f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4808 2064 ac1e9f04ae7f6389a639734774b1174f.exe 91 PID 2064 wrote to memory of 4808 2064 ac1e9f04ae7f6389a639734774b1174f.exe 91 PID 2064 wrote to memory of 4808 2064 ac1e9f04ae7f6389a639734774b1174f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1e9f04ae7f6389a639734774b1174f.exe"C:\Users\Admin\AppData\Local\Temp\ac1e9f04ae7f6389a639734774b1174f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\ac1e9f04ae7f6389a639734774b1174f.exeC:\Users\Admin\AppData\Local\Temp\ac1e9f04ae7f6389a639734774b1174f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD532b635e034b591848e76aed280cafd48
SHA1801ee68d9962c8150fe404b5e0cb57f1d69f717c
SHA25654df8887674eb8dfb48ed1c6cbe9dd1d889b62e5173232f8a17fe8b0ed2a2437
SHA5127845cde1d82f3e182eed5ecfce9b0e845d01892d6912977077eb62db348a2dabfa0e635252251861909a293b58347bc25b2fddef67c729a8331c44c5acf0f0a2