Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
b727547034889c8691f838fc13e4cc24.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b727547034889c8691f838fc13e4cc24.exe
Resource
win10v2004-20240226-en
General
-
Target
b727547034889c8691f838fc13e4cc24.exe
-
Size
82KB
-
MD5
b727547034889c8691f838fc13e4cc24
-
SHA1
277e53cf766d0574bb1d070d5e59c9b5909551b8
-
SHA256
e3b6fbbcc9fbb58debbca3096dd4b9cd88d72dd577fcf0612389be218b2411f6
-
SHA512
d8cf4d753410055f7148eee21d8895f2cc975f108eca63c98c213dd847112023f58ef2ebc937d83964a68d7dd1c369633301780a3b42e50db771d46c1240d84b
-
SSDEEP
1536:GuFRzx6O/jzYiegesR05eVt86XoXg/ZETdRCc+GMI093H4z:5FCiwiAa05eVt8GoXg/+XCxvxHy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 b727547034889c8691f838fc13e4cc24.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 b727547034889c8691f838fc13e4cc24.exe -
Loads dropped DLL 1 IoCs
pid Process 848 b727547034889c8691f838fc13e4cc24.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 848 b727547034889c8691f838fc13e4cc24.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 848 b727547034889c8691f838fc13e4cc24.exe 2700 b727547034889c8691f838fc13e4cc24.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 848 wrote to memory of 2700 848 b727547034889c8691f838fc13e4cc24.exe 29 PID 848 wrote to memory of 2700 848 b727547034889c8691f838fc13e4cc24.exe 29 PID 848 wrote to memory of 2700 848 b727547034889c8691f838fc13e4cc24.exe 29 PID 848 wrote to memory of 2700 848 b727547034889c8691f838fc13e4cc24.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe"C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exeC:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d1006ee568505ee8dc6ce49087b59859
SHA10d5a262fbbbdfc03f55fa018b27d365035711507
SHA2567a35ab5fa74a9a5f61c1257553073dd879cc034abe9f92643dea20d28d2515c0
SHA51205c31ebc055d1c51900db04a1f4a666ca66b70927d2a99fd4e0deb4bb188ba54b3cccf4ce4215f6d26c85bc0b7ce6c282e2e2d00c93afebdc76b2de3e70c2d83