Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 19:31
Behavioral task
behavioral1
Sample
b57e70dc768c988814f973a6912c1f25.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b57e70dc768c988814f973a6912c1f25.exe
Resource
win10v2004-20240226-en
General
-
Target
b57e70dc768c988814f973a6912c1f25.exe
-
Size
1.3MB
-
MD5
b57e70dc768c988814f973a6912c1f25
-
SHA1
75ceb9bf90b44adfb63aebe8e1c31e4292173304
-
SHA256
7ae3e1b421304c074923bfc630b301801b1fa383078aec301bd0cb9053d7591d
-
SHA512
7fb2a64f92b09a350a00abf6df5a95d85030a589407c5da45bf6b0ab0ec4f64ec957bd133df0ae589c66da7f473374472670bd66b2ee45258e12e75eee8c04c2
-
SSDEEP
24576:I6Zn+UCu0PHKOZl64VjkDbFClwvmUGbSE28z0dpWaR2gU9/9Us:I80PHKO68jkvYlmm9tlz0d0VPR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1808 b57e70dc768c988814f973a6912c1f25.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 b57e70dc768c988814f973a6912c1f25.exe -
resource yara_rule behavioral2/memory/2636-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x0007000000023217-11.dat upx behavioral2/memory/1808-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2636 b57e70dc768c988814f973a6912c1f25.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2636 b57e70dc768c988814f973a6912c1f25.exe 1808 b57e70dc768c988814f973a6912c1f25.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1808 2636 b57e70dc768c988814f973a6912c1f25.exe 91 PID 2636 wrote to memory of 1808 2636 b57e70dc768c988814f973a6912c1f25.exe 91 PID 2636 wrote to memory of 1808 2636 b57e70dc768c988814f973a6912c1f25.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57e70dc768c988814f973a6912c1f25.exe"C:\Users\Admin\AppData\Local\Temp\b57e70dc768c988814f973a6912c1f25.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\b57e70dc768c988814f973a6912c1f25.exeC:\Users\Admin\AppData\Local\Temp\b57e70dc768c988814f973a6912c1f25.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b30fe61db281083260087ff7653db258
SHA1937064fe47171cf57432fe1020153b4e72e6fbae
SHA2562ae44e89b5a2ca09f342f1a55df413745ee485d1b797e4be433c1d38af58aaf2
SHA512425625facc776582f745a81eda7c9e27ec7378e8ad6e106c2d7e8a4ed4ba310a9ec3041543ec57ce5b8ac1d6262950db21d82d2987e4aa618575b7b37a13c473