Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:43
Behavioral task
behavioral1
Sample
b49eff2810e069bbf5d8edce8f48257a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b49eff2810e069bbf5d8edce8f48257a.exe
Resource
win10v2004-20240226-en
General
-
Target
b49eff2810e069bbf5d8edce8f48257a.exe
-
Size
1.3MB
-
MD5
b49eff2810e069bbf5d8edce8f48257a
-
SHA1
83cc7b12f44aa5339bbbfa34fef84a1b5ee0a54a
-
SHA256
df2e007875871660b196abeedca30db0920c6801fd77b73bf8f1f4ce8f82945b
-
SHA512
ebcc5ec1f525a2e4ff3cf1c26da24f6cd8dfb16e07f9de3572615f35f4897ed4c4c3804532950af7d4ea079452b8ead6735e57aa28b5c80276b40c3e94d5f0fb
-
SSDEEP
24576:UX14C+VtOWIv9mqwkMeltenBmpCnsJX9hJCPK3uI7gP1zx3socWc:lttToQqwdelgB6ke60uI7g9mocp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4608 b49eff2810e069bbf5d8edce8f48257a.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 b49eff2810e069bbf5d8edce8f48257a.exe -
resource yara_rule behavioral2/memory/3176-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0004000000022747-11.dat upx behavioral2/memory/4608-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3176 b49eff2810e069bbf5d8edce8f48257a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3176 b49eff2810e069bbf5d8edce8f48257a.exe 4608 b49eff2810e069bbf5d8edce8f48257a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4608 3176 b49eff2810e069bbf5d8edce8f48257a.exe 87 PID 3176 wrote to memory of 4608 3176 b49eff2810e069bbf5d8edce8f48257a.exe 87 PID 3176 wrote to memory of 4608 3176 b49eff2810e069bbf5d8edce8f48257a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49eff2810e069bbf5d8edce8f48257a.exe"C:\Users\Admin\AppData\Local\Temp\b49eff2810e069bbf5d8edce8f48257a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\b49eff2810e069bbf5d8edce8f48257a.exeC:\Users\Admin\AppData\Local\Temp\b49eff2810e069bbf5d8edce8f48257a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD554bccc81512655103772db786a70c604
SHA11c0ef2ea0cbf4e59249f619669a8d7fa9d7023f3
SHA2562c4c7f670eb0bb8f7f4b7404ace06cad3c0bd1273d00eec6f4663f05030b5bb6
SHA512fb123be6c398f8e124fdebb7fcd8975bcbeebbdedee516aad6437337bb83809d42c5e59f9e39a871527431902d6a98fbbf2f18d9174f9c1894c61fb39ce23038