Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 22:03
Behavioral task
behavioral1
Sample
b84cefbe6ae908abea0cd29ea8f4cad6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b84cefbe6ae908abea0cd29ea8f4cad6.exe
Resource
win10v2004-20240226-en
General
-
Target
b84cefbe6ae908abea0cd29ea8f4cad6.exe
-
Size
1.3MB
-
MD5
b84cefbe6ae908abea0cd29ea8f4cad6
-
SHA1
71132fda98215df25786b479fa16041e14e102c4
-
SHA256
edad1b3b46ce98a902a52c20b823000d23a3f9e87bc1c8cd110c06210fd85a6e
-
SHA512
34f52d10f454aa2c1acef8cf273ad2750d709b9c9176639425f49c6a2cccd39898ee2107bfd8f6204851d0270473e7427f2a93ee8af9e6bf08cc33a84d3984a9
-
SSDEEP
24576:mhz7xJzRyZb1cI5gF0svj184sdj4jPOZ1zxO6Ef5P36X9K5yDLi4vG:mhz1JVkZxM0sbe/aPA1z46ysc8C
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 b84cefbe6ae908abea0cd29ea8f4cad6.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 b84cefbe6ae908abea0cd29ea8f4cad6.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe -
resource yara_rule behavioral1/memory/2188-1-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000c000000012233-11.dat upx behavioral1/memory/2956-18-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe 2956 b84cefbe6ae908abea0cd29ea8f4cad6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2956 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe 28 PID 2188 wrote to memory of 2956 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe 28 PID 2188 wrote to memory of 2956 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe 28 PID 2188 wrote to memory of 2956 2188 b84cefbe6ae908abea0cd29ea8f4cad6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84cefbe6ae908abea0cd29ea8f4cad6.exe"C:\Users\Admin\AppData\Local\Temp\b84cefbe6ae908abea0cd29ea8f4cad6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\b84cefbe6ae908abea0cd29ea8f4cad6.exeC:\Users\Admin\AppData\Local\Temp\b84cefbe6ae908abea0cd29ea8f4cad6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD548bf06871e9e8e6384725d2f7c06241f
SHA1184b3c0abe2a0007130549005ede808381a8d024
SHA256b9fc67f3d8c5fb2611044714ba1895deb67979bbbb319c0fcdd3600daa0c5c08
SHA512cc28c0972eb8ece9780aaf3f9afabcb47ee7efb026a1542d10b005b1f14185b33fdb2d839d03cd10c62968da51df2476324e05950fdc3de76cb29e0ad015722c