Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
b727547034889c8691f838fc13e4cc24.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b727547034889c8691f838fc13e4cc24.exe
Resource
win10v2004-20240226-en
General
-
Target
b727547034889c8691f838fc13e4cc24.exe
-
Size
82KB
-
MD5
b727547034889c8691f838fc13e4cc24
-
SHA1
277e53cf766d0574bb1d070d5e59c9b5909551b8
-
SHA256
e3b6fbbcc9fbb58debbca3096dd4b9cd88d72dd577fcf0612389be218b2411f6
-
SHA512
d8cf4d753410055f7148eee21d8895f2cc975f108eca63c98c213dd847112023f58ef2ebc937d83964a68d7dd1c369633301780a3b42e50db771d46c1240d84b
-
SSDEEP
1536:GuFRzx6O/jzYiegesR05eVt86XoXg/ZETdRCc+GMI093H4z:5FCiwiAa05eVt8GoXg/+XCxvxHy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4100 b727547034889c8691f838fc13e4cc24.exe -
Executes dropped EXE 1 IoCs
pid Process 4100 b727547034889c8691f838fc13e4cc24.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 392 b727547034889c8691f838fc13e4cc24.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 392 b727547034889c8691f838fc13e4cc24.exe 4100 b727547034889c8691f838fc13e4cc24.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 4100 392 b727547034889c8691f838fc13e4cc24.exe 100 PID 392 wrote to memory of 4100 392 b727547034889c8691f838fc13e4cc24.exe 100 PID 392 wrote to memory of 4100 392 b727547034889c8691f838fc13e4cc24.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe"C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exeC:\Users\Admin\AppData\Local\Temp\b727547034889c8691f838fc13e4cc24.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1376 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:3752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD534ac0d8b91657d663dba9fc086673e49
SHA18c057f16c327d76c5d4a23746a3df2cc06101752
SHA256c352989bd1c32318754b8e49671fa1293be571a1de4922856221d0c6871f4973
SHA51284d75fb6d8958e916beb472861526136784dd9dcff4a16f4501268b5824dbffbbb889323e2824e4100c0b4423647903f3f441ab8837e2854a8bbf5eb2aad7628