Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
b4f2bf9ac9db7fe18614b2f38eb4f565.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f2bf9ac9db7fe18614b2f38eb4f565.exe
Resource
win10v2004-20240226-en
General
-
Target
b4f2bf9ac9db7fe18614b2f38eb4f565.exe
-
Size
82KB
-
MD5
b4f2bf9ac9db7fe18614b2f38eb4f565
-
SHA1
cb6b40cfe1564f98977373cd1f89d8e910838534
-
SHA256
8b8beb6f8ebbf3e156cc02926ad5e328fa1cec5ffe873b5db215a7bcf477e369
-
SHA512
f38b06d41331118778b7c076a8c17f35fd67852bd7f606cad66dfac3388ef1db2f01ed95e7765c363e2e4d7b0059994f06a9588b87e49b3fea8452d674d7987b
-
SSDEEP
1536:evxz6PXH12ZT1coBKArRZRcBHUSRAeHxzE5BIiXB42xf+x:+AV25upArRTcBHQbBIieHx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 b4f2bf9ac9db7fe18614b2f38eb4f565.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 b4f2bf9ac9db7fe18614b2f38eb4f565.exe -
Loads dropped DLL 1 IoCs
pid Process 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe 2964 b4f2bf9ac9db7fe18614b2f38eb4f565.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2964 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe 29 PID 1940 wrote to memory of 2964 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe 29 PID 1940 wrote to memory of 2964 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe 29 PID 1940 wrote to memory of 2964 1940 b4f2bf9ac9db7fe18614b2f38eb4f565.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4f2bf9ac9db7fe18614b2f38eb4f565.exe"C:\Users\Admin\AppData\Local\Temp\b4f2bf9ac9db7fe18614b2f38eb4f565.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\b4f2bf9ac9db7fe18614b2f38eb4f565.exeC:\Users\Admin\AppData\Local\Temp\b4f2bf9ac9db7fe18614b2f38eb4f565.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a2dc93da71d898bd1052b087e7eff89e
SHA16506b193e0ec28a86856d48f0e1807426b4b32ac
SHA2569dfc0f5429c80a5dec3184dfb54180ab813867d76e1aee4395f9bf02db80b30c
SHA512d503125b22010c698b8773c14bf37a014ab0be75687ca08fb05247aa9bb4cacb8525f89194bfb797d0c945ec3d52ab0fdef7ea741154b7be3edf14c17b485e33