Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 09:02
Behavioral task
behavioral1
Sample
b7095b2f611d05d52cc02b1fd82c85f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7095b2f611d05d52cc02b1fd82c85f3.exe
Resource
win10v2004-20240226-en
General
-
Target
b7095b2f611d05d52cc02b1fd82c85f3.exe
-
Size
1.3MB
-
MD5
b7095b2f611d05d52cc02b1fd82c85f3
-
SHA1
b56eeead1e5524a7385f8ef2ce47597ad6221d47
-
SHA256
bdbf137cba6de8d21b47a1b7a56010fc225761bb142ca8d7d2d16737fffe0ca8
-
SHA512
3663ce3c9a814a3fbd51ce1c60ebb8c72f50187121fc697ccd25ca4df68d20df5bebb352a7d2dccfb1ca128332e22244aeff0d210253ad2f3dbff3ff847b5174
-
SSDEEP
24576:CE5MrjRg1K9FC0Bjd4r+HawwNdWPr8udXQSzHpMyiy2igOOvG:CEujRg49jBd6zUPrHd1JMyiK7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1148 b7095b2f611d05d52cc02b1fd82c85f3.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 b7095b2f611d05d52cc02b1fd82c85f3.exe -
resource yara_rule behavioral2/memory/1516-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000001e59e-12.dat upx behavioral2/memory/1148-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1516 b7095b2f611d05d52cc02b1fd82c85f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1516 b7095b2f611d05d52cc02b1fd82c85f3.exe 1148 b7095b2f611d05d52cc02b1fd82c85f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1148 1516 b7095b2f611d05d52cc02b1fd82c85f3.exe 90 PID 1516 wrote to memory of 1148 1516 b7095b2f611d05d52cc02b1fd82c85f3.exe 90 PID 1516 wrote to memory of 1148 1516 b7095b2f611d05d52cc02b1fd82c85f3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7095b2f611d05d52cc02b1fd82c85f3.exe"C:\Users\Admin\AppData\Local\Temp\b7095b2f611d05d52cc02b1fd82c85f3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\b7095b2f611d05d52cc02b1fd82c85f3.exeC:\Users\Admin\AppData\Local\Temp\b7095b2f611d05d52cc02b1fd82c85f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1148
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD514b04f56639d7d7e571abb55ea1640b2
SHA1cf236be796bfdb4333380813c1a68ee1c428ad97
SHA256e7a688a0f2ccd54a6a9e49e4725ff1119b6080595dfc94a88db44a09760e4d96
SHA5129512b175c5e5cd04a91400a86e011eff76f8ac47750909b2da45701ef7cd0dcc3b003b005a6de3a00957e06305c3beb2808c343f779e2b99a45a1d5cb47641d1