Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 12:34
Behavioral task
behavioral1
Sample
b4b47c177c7ddc3cc30f840bec276b6d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4b47c177c7ddc3cc30f840bec276b6d.exe
Resource
win10v2004-20240226-en
General
-
Target
b4b47c177c7ddc3cc30f840bec276b6d.exe
-
Size
2.7MB
-
MD5
b4b47c177c7ddc3cc30f840bec276b6d
-
SHA1
d22d8acef1fe57ba2485b1a6c62f27290fa2707e
-
SHA256
4065351f81489a6d5a519d99b0fc0f2bd468a29c9a4b786a44b56f1159cf1974
-
SHA512
95dc2178015bf45711f374105a9787cf4663dd3508471435f9c06ec5a2249d99aca78f91411c890f72c357f45eaaa6ae890a2b1248cca364dd3b5580622dad55
-
SSDEEP
49152:HQhxbWqtCP46UclFZLBmwfJlSTQh1KrAuZVEjR8rWDEhlQY53bO3M74f:HQfWWCPRrFV/l5srAf1EdpS3W4f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2532 b4b47c177c7ddc3cc30f840bec276b6d.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 b4b47c177c7ddc3cc30f840bec276b6d.exe -
resource yara_rule behavioral2/memory/2684-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e59e-11.dat upx behavioral2/memory/2532-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2684 b4b47c177c7ddc3cc30f840bec276b6d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2684 b4b47c177c7ddc3cc30f840bec276b6d.exe 2532 b4b47c177c7ddc3cc30f840bec276b6d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2532 2684 b4b47c177c7ddc3cc30f840bec276b6d.exe 87 PID 2684 wrote to memory of 2532 2684 b4b47c177c7ddc3cc30f840bec276b6d.exe 87 PID 2684 wrote to memory of 2532 2684 b4b47c177c7ddc3cc30f840bec276b6d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b47c177c7ddc3cc30f840bec276b6d.exe"C:\Users\Admin\AppData\Local\Temp\b4b47c177c7ddc3cc30f840bec276b6d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\b4b47c177c7ddc3cc30f840bec276b6d.exeC:\Users\Admin\AppData\Local\Temp\b4b47c177c7ddc3cc30f840bec276b6d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ee74fef0504a75e37e88ecfb2f6d0d58
SHA1c4002beb00f3759c3d4749cd4eb7ba4f45708ae8
SHA2563b78c5883e41b8c23ffd4042223674fdb303a96f6c1886e0e8f6334ef809b1b8
SHA51289fc9fcf999aff599bf9e932b538c37c7c54216adf83c34e8660b41482c71fe24af18da216e76e122c4bb38630c8c4f2fb1e9260a537c93f139365391bbd7368