Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 10:33
Behavioral task
behavioral1
Sample
b733e38ed4c1159b74aa18fc778770c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b733e38ed4c1159b74aa18fc778770c8.exe
Resource
win10v2004-20240226-en
General
-
Target
b733e38ed4c1159b74aa18fc778770c8.exe
-
Size
1.5MB
-
MD5
b733e38ed4c1159b74aa18fc778770c8
-
SHA1
e1d745f2ab9f5a53a9891e48681f827e61d593fc
-
SHA256
f08ab388713b11fa6212d7aba591f0f1ea222a0dd4c87927ab569152dcf5f120
-
SHA512
535c36e9a098b91817e4ba7577309b2466a16c721bb70e63f8cd4b8868555644284766cf07a150c4365374a0dbffe3dff7f285c13842c235d73c63f0bb2d711e
-
SSDEEP
24576:/nVwufM90Jg4g6gFNmdj5cXtV+KNv4VmT5BokOOsTiWq76xrCNAonrYW:GufOxFSct1Hgipe2TY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3012 b733e38ed4c1159b74aa18fc778770c8.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 b733e38ed4c1159b74aa18fc778770c8.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 b733e38ed4c1159b74aa18fc778770c8.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012251-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 b733e38ed4c1159b74aa18fc778770c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2224 b733e38ed4c1159b74aa18fc778770c8.exe 3012 b733e38ed4c1159b74aa18fc778770c8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 3012 2224 b733e38ed4c1159b74aa18fc778770c8.exe 28 PID 2224 wrote to memory of 3012 2224 b733e38ed4c1159b74aa18fc778770c8.exe 28 PID 2224 wrote to memory of 3012 2224 b733e38ed4c1159b74aa18fc778770c8.exe 28 PID 2224 wrote to memory of 3012 2224 b733e38ed4c1159b74aa18fc778770c8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b733e38ed4c1159b74aa18fc778770c8.exe"C:\Users\Admin\AppData\Local\Temp\b733e38ed4c1159b74aa18fc778770c8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\b733e38ed4c1159b74aa18fc778770c8.exeC:\Users\Admin\AppData\Local\Temp\b733e38ed4c1159b74aa18fc778770c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD557b26da7a60efed437019c43d4c896a8
SHA1987a619fad696914da9bfe3d1e051faf1cb4faae
SHA256c2e967e8a448337b2f14c3d2597ed4e41398d716f569f82427d1111a0d2974d3
SHA5127617c4a9495e2d14cc07c10421cd35473092febb08d1feb92c7260add039449d96d85d43eb792f006ba3f89b041cfbf107bb579701bde712bef7c22ea569f57a