Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
b60ea68a6e29f5562a39bb4755f3c48e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b60ea68a6e29f5562a39bb4755f3c48e.exe
Resource
win10v2004-20240226-en
General
-
Target
b60ea68a6e29f5562a39bb4755f3c48e.exe
-
Size
81KB
-
MD5
b60ea68a6e29f5562a39bb4755f3c48e
-
SHA1
0c115bf3b78410d33580361c92466045228d5f07
-
SHA256
5feaaaadece77b375c1d44e625e46fff1fc7821de0d14b0f915c7324369cfa0b
-
SHA512
7eac10eb658bc62789b2c1215c63270f6c019a6848aab272d3c0b2472b2adfab9b0033aad16c15cb5823f2ddc2bd5942682085ae3b34dc92608738dec61a2daa
-
SSDEEP
1536:qFZyxBDWFA7GCnfx9kMccXHFAioWgbcun7WychTmrK3ptFnxIKiUIxd4BgvW:YUGwWP2w5chTLpHxIbGgvW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1136 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Executes dropped EXE 1 IoCs
pid Process 1136 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3948 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3948 b60ea68a6e29f5562a39bb4755f3c48e.exe 1136 b60ea68a6e29f5562a39bb4755f3c48e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 1136 3948 b60ea68a6e29f5562a39bb4755f3c48e.exe 88 PID 3948 wrote to memory of 1136 3948 b60ea68a6e29f5562a39bb4755f3c48e.exe 88 PID 3948 wrote to memory of 1136 3948 b60ea68a6e29f5562a39bb4755f3c48e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe"C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exeC:\Users\Admin\AppData\Local\Temp\b60ea68a6e29f5562a39bb4755f3c48e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a858950db862636c249ba8670049df30
SHA1c0a1bb4d709aca2415f879a5902d03b6b2c2f89f
SHA25638731f5ee044f61b30979ae52b05a086fcc87f2529a2a34065978e196adba03d
SHA512f1255f2fe9dd7d48e2829fd96d3f1f61387e912b3b366b9287a5e5478d8ffcda044354c40a5fdc79a23cb42595a8c6e5f00d832708fe90d19a3dce636dcfb6ae