Analysis
-
max time kernel
127s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
b59455b6fe909a0e17f48c2e2f398163.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b59455b6fe909a0e17f48c2e2f398163.exe
Resource
win10v2004-20240226-en
General
-
Target
b59455b6fe909a0e17f48c2e2f398163.exe
-
Size
82KB
-
MD5
b59455b6fe909a0e17f48c2e2f398163
-
SHA1
37bdf919b77ddabec9c4b17443d9824c5ea9810a
-
SHA256
5f9d268dee7237819dfcae2c1bc401986b0714a7c826bec6ba3511c6fb867122
-
SHA512
97cd010933b2f17644d77a628410d3dc774a0dc7a97e4a4e4c126cd2f89344706eeffd96d5cdbe192b79707815ae26733daef7e5808d7a786f22aedd1251e78e
-
SSDEEP
1536:+tBhDyOsCXl8civbCuc1HV362pgPgkD8lXM+zajSdcHoocm44GjLP0OiiRWMTPP4:+BDyOsuWYWEPP0CRfTPZtRkAQlo+zk2D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2000 b59455b6fe909a0e17f48c2e2f398163.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2248 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2248 b59455b6fe909a0e17f48c2e2f398163.exe 2000 b59455b6fe909a0e17f48c2e2f398163.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2000 2248 b59455b6fe909a0e17f48c2e2f398163.exe 95 PID 2248 wrote to memory of 2000 2248 b59455b6fe909a0e17f48c2e2f398163.exe 95 PID 2248 wrote to memory of 2000 2248 b59455b6fe909a0e17f48c2e2f398163.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe"C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exeC:\Users\Admin\AppData\Local\Temp\b59455b6fe909a0e17f48c2e2f398163.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:81⤵PID:1776
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f2be5219e17d2709f35e372a262564e2
SHA1deba6b6d53da3b1299d502cd312209cd7506022d
SHA2562b21885df550d199d982bce5f1fca54a8e8207ac5061b6a796a4c28180ad7b92
SHA51254a2548551182116917e2609767204f8215106278833f551a639d9512542f007f35e8fa15336ad1a0a9ead1d577ba7669eab832f54cdf40f7e83e6db13bf1823