Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 12:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4be54bef4bd4ad3851f16237232e38a.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b4be54bef4bd4ad3851f16237232e38a.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
b4be54bef4bd4ad3851f16237232e38a.exe
-
Size
240KB
-
MD5
b4be54bef4bd4ad3851f16237232e38a
-
SHA1
122137a3346848f70409fac01e26cb3171074a35
-
SHA256
879b9977e0f396b8b3f0bf3f2e2ff22c0d26185a3d2096b370b32e52bb8644fe
-
SHA512
8c4d4fc491574529872bce7a722673f857b90e27a700f63684a0259cb51ba9f35a6e03e674c252b92994d9c5f47bec7e2c2fa01de0ee5e52e4cbe4a9a0629420
-
SSDEEP
6144:LoDHy5sFlJgSqyBcjXRyCDnywWRDbQ9cxo8pX:LwSmFlGSqyBOXRVDnywYDE6x5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 9 IoCs
pid Process 3736 b4be54bef4bd4ad3851f16237232e38a.exe 4564 hzkxrlii.exe 3360 rbnynk.exe 2520 hrtlulk.exe 3256 mwoxkaoglbhrp.exe 4552 hcefl.exe 1152 zvtfpjzr.exe 1728 gghzds.exe 712 modzmrbergc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4564 3736 b4be54bef4bd4ad3851f16237232e38a.exe 102 PID 3736 wrote to memory of 4564 3736 b4be54bef4bd4ad3851f16237232e38a.exe 102 PID 3736 wrote to memory of 4564 3736 b4be54bef4bd4ad3851f16237232e38a.exe 102 PID 4564 wrote to memory of 3360 4564 hzkxrlii.exe 106 PID 4564 wrote to memory of 3360 4564 hzkxrlii.exe 106 PID 4564 wrote to memory of 3360 4564 hzkxrlii.exe 106 PID 3360 wrote to memory of 2520 3360 rbnynk.exe 110 PID 3360 wrote to memory of 2520 3360 rbnynk.exe 110 PID 3360 wrote to memory of 2520 3360 rbnynk.exe 110 PID 2520 wrote to memory of 3256 2520 hrtlulk.exe 112 PID 2520 wrote to memory of 3256 2520 hrtlulk.exe 112 PID 2520 wrote to memory of 3256 2520 hrtlulk.exe 112 PID 3256 wrote to memory of 4552 3256 mwoxkaoglbhrp.exe 114 PID 3256 wrote to memory of 4552 3256 mwoxkaoglbhrp.exe 114 PID 3256 wrote to memory of 4552 3256 mwoxkaoglbhrp.exe 114 PID 4552 wrote to memory of 1152 4552 hcefl.exe 115 PID 4552 wrote to memory of 1152 4552 hcefl.exe 115 PID 4552 wrote to memory of 1152 4552 hcefl.exe 115 PID 1152 wrote to memory of 1728 1152 zvtfpjzr.exe 119 PID 1152 wrote to memory of 1728 1152 zvtfpjzr.exe 119 PID 1152 wrote to memory of 1728 1152 zvtfpjzr.exe 119 PID 1728 wrote to memory of 712 1728 gghzds.exe 121 PID 1728 wrote to memory of 712 1728 gghzds.exe 121 PID 1728 wrote to memory of 712 1728 gghzds.exe 121 PID 712 wrote to memory of 2580 712 modzmrbergc.exe 122 PID 712 wrote to memory of 2580 712 modzmrbergc.exe 122 PID 712 wrote to memory of 2580 712 modzmrbergc.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4be54bef4bd4ad3851f16237232e38a.exe"C:\Users\Admin\AppData\Local\Temp\b4be54bef4bd4ad3851f16237232e38a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\hzkxrlii.exeC:\Windows\system32\hzkxrlii.exe2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rbnynk.exeC:\Windows\system32\rbnynk.exe3⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\hrtlulk.exeC:\Windows\system32\hrtlulk.exe4⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\mwoxkaoglbhrp.exeC:\Windows\system32\mwoxkaoglbhrp.exe5⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\hcefl.exeC:\Windows\system32\hcefl.exe6⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\zvtfpjzr.exeC:\Windows\system32\zvtfpjzr.exe7⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\gghzds.exeC:\Windows\system32\gghzds.exe8⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\modzmrbergc.exeC:\Windows\system32\modzmrbergc.exe9⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rgpqawz.exeC:\Windows\system32\rgpqawz.exe10⤵PID:2580
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:81⤵PID:1864