Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 09:32
Behavioral task
behavioral1
Sample
b45eb619d92bf6ba97c3aa59c979eabb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b45eb619d92bf6ba97c3aa59c979eabb.exe
Resource
win10v2004-20240226-en
General
-
Target
b45eb619d92bf6ba97c3aa59c979eabb.exe
-
Size
2.9MB
-
MD5
b45eb619d92bf6ba97c3aa59c979eabb
-
SHA1
c117ce59d0abc15d658ca7d5f77ee24151a019be
-
SHA256
e2327a840ab076ad4584d0dde201ccde553b9426553cbfe368cf33ccea88a037
-
SHA512
ad003490b920a7b0ebfc38f7c8d4bf236df8cc1a1d203f53094dcc4dfbe77fc40fce5dd67f75acefff7d35a527facd3de541bbedfe1dd20d52210c14292f2a14
-
SSDEEP
49152:WDuqJf/cSD+rhtkVdphP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:WSYJktcgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 b45eb619d92bf6ba97c3aa59c979eabb.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 b45eb619d92bf6ba97c3aa59c979eabb.exe -
Loads dropped DLL 1 IoCs
pid Process 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe -
resource yara_rule behavioral1/memory/2356-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012266-10.dat upx behavioral1/files/0x000b000000012266-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe 2984 b45eb619d92bf6ba97c3aa59c979eabb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2984 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe 28 PID 2356 wrote to memory of 2984 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe 28 PID 2356 wrote to memory of 2984 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe 28 PID 2356 wrote to memory of 2984 2356 b45eb619d92bf6ba97c3aa59c979eabb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b45eb619d92bf6ba97c3aa59c979eabb.exe"C:\Users\Admin\AppData\Local\Temp\b45eb619d92bf6ba97c3aa59c979eabb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\b45eb619d92bf6ba97c3aa59c979eabb.exeC:\Users\Admin\AppData\Local\Temp\b45eb619d92bf6ba97c3aa59c979eabb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5b64c9394564f8a063e5cecd5569dcbdd
SHA1585f3c4fb3a60771d2652a3c0baa4c2e701b3a4a
SHA256e70c33f6a4273045c3a667c2b286d95b1804592508108b6480276121b2a1ed0f
SHA512e3ecc2c92d32a0ec8d93fd0526f7cb112b2d157b7d18c4175c559fbe38bce5d6b4e09066094b98a977485cd9dc1b3d0b8fc3c7d3155f3d9f557bc7ba23cd2bf5