Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
b60ea68a6e29f5562a39bb4755f3c48e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b60ea68a6e29f5562a39bb4755f3c48e.exe
Resource
win10v2004-20240226-en
General
-
Target
b60ea68a6e29f5562a39bb4755f3c48e.exe
-
Size
81KB
-
MD5
b60ea68a6e29f5562a39bb4755f3c48e
-
SHA1
0c115bf3b78410d33580361c92466045228d5f07
-
SHA256
5feaaaadece77b375c1d44e625e46fff1fc7821de0d14b0f915c7324369cfa0b
-
SHA512
7eac10eb658bc62789b2c1215c63270f6c019a6848aab272d3c0b2472b2adfab9b0033aad16c15cb5823f2ddc2bd5942682085ae3b34dc92608738dec61a2daa
-
SSDEEP
1536:qFZyxBDWFA7GCnfx9kMccXHFAioWgbcun7WychTmrK3ptFnxIKiUIxd4BgvW:YUGwWP2w5chTLpHxIbGgvW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe 3052 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3052 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe 29 PID 2224 wrote to memory of 3052 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe 29 PID 2224 wrote to memory of 3052 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe 29 PID 2224 wrote to memory of 3052 2224 b60ea68a6e29f5562a39bb4755f3c48e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe"C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exeC:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD55992d58d8cbaa29a07c860eef30599a5
SHA1a27f71eddcc13f6af6999cca31f4556980136c6d
SHA2565aa2e2a9ee2d1d2615935ecb76ff3824e63891f6174e404db9c155a8a93f344b
SHA512c344d265e18b9171b1783785867a9da75e45e8b09de40e2626c3869b4145cf365515b86b3288d841f5774b409194a349980772e3cdfb1bccfc4cd047c1e00cb5