Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:54
Behavioral task
behavioral1
Sample
b5c097512ce3687f31acf42cf746f7ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b5c097512ce3687f31acf42cf746f7ad.exe
Resource
win10v2004-20240226-en
General
-
Target
b5c097512ce3687f31acf42cf746f7ad.exe
-
Size
1.3MB
-
MD5
b5c097512ce3687f31acf42cf746f7ad
-
SHA1
1c0201bae58c1abd2839cc5dea0c69683a24a125
-
SHA256
08e9976c21d9083359831fa13a6d3e172ffeb40fb87589e78af0e85c5aa5510d
-
SHA512
5149e981ea10e54d518813684002d20b9c9c5d51f4cbc8ec1b313649b7ff9c0cb3fe82c095149d5dd01d2126c0a1707d6084ab351718416e45880c3461f09888
-
SSDEEP
24576:Fs7TEb8HxZEtWhA7ppHH6b/uuyiGuENs+LxJFscKG57WU9/9Us:FEYbkEh7pCMi9usMxAcLJR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 b5c097512ce3687f31acf42cf746f7ad.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 b5c097512ce3687f31acf42cf746f7ad.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 b5c097512ce3687f31acf42cf746f7ad.exe -
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000c00000001225d-10.dat upx behavioral1/memory/2192-14-0x00000000034E0000-0x00000000039C7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 b5c097512ce3687f31acf42cf746f7ad.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2192 b5c097512ce3687f31acf42cf746f7ad.exe 2572 b5c097512ce3687f31acf42cf746f7ad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2572 2192 b5c097512ce3687f31acf42cf746f7ad.exe 29 PID 2192 wrote to memory of 2572 2192 b5c097512ce3687f31acf42cf746f7ad.exe 29 PID 2192 wrote to memory of 2572 2192 b5c097512ce3687f31acf42cf746f7ad.exe 29 PID 2192 wrote to memory of 2572 2192 b5c097512ce3687f31acf42cf746f7ad.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5c097512ce3687f31acf42cf746f7ad.exe"C:\Users\Admin\AppData\Local\Temp\b5c097512ce3687f31acf42cf746f7ad.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\b5c097512ce3687f31acf42cf746f7ad.exeC:\Users\Admin\AppData\Local\Temp\b5c097512ce3687f31acf42cf746f7ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2572
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53fed656675d9a8e7b73415bee487449f
SHA133126be82cf419add2f9ce62f5373c06cf2d32b7
SHA256263e5b156b37483952f165e70cac4d1f8e756557f9b938cf205a7aa3e6f3c5f1
SHA51289da36679f288a76797322807ab288a6553ee8c0f4f56bc841dac0a42bb3b12cbdb0e085d573fe06e9f86da54803d85bd9df49b4b3732395bde08835eba7076e