Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 13:56
Behavioral task
behavioral1
Sample
b7914722cbc08bb90765b410c3e0d7f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7914722cbc08bb90765b410c3e0d7f1.exe
Resource
win10v2004-20240226-en
General
-
Target
b7914722cbc08bb90765b410c3e0d7f1.exe
-
Size
2.9MB
-
MD5
b7914722cbc08bb90765b410c3e0d7f1
-
SHA1
22e0add9165aa32d406fadbd852ba00c6cc11845
-
SHA256
c797456de0320143da6e3ab0f52725ab7601317270f9dad2f5e2f371cb8f68bc
-
SHA512
2bc2400bd3f6ef6ff9b472e329455ecb89fb095426b27cd0a04e6535195b6f7058a99556908017768db041a7a8b90fed4dda35257065b574390d69519a3e8fb1
-
SSDEEP
49152:Up8BOhfSjYb9ylcj0p3ANU3TRqkIecfslw8Cf22MaGs0CuqT0RvSB2:UpThf6fcj0pw6D8kIecfktpfBCuUpw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1384 b7914722cbc08bb90765b410c3e0d7f1.exe -
Executes dropped EXE 1 IoCs
pid Process 1384 b7914722cbc08bb90765b410c3e0d7f1.exe -
resource yara_rule behavioral2/memory/640-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e59e-11.dat upx behavioral2/memory/1384-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 640 b7914722cbc08bb90765b410c3e0d7f1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1632 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 640 b7914722cbc08bb90765b410c3e0d7f1.exe 1384 b7914722cbc08bb90765b410c3e0d7f1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 1384 640 b7914722cbc08bb90765b410c3e0d7f1.exe 89 PID 640 wrote to memory of 1384 640 b7914722cbc08bb90765b410c3e0d7f1.exe 89 PID 640 wrote to memory of 1384 640 b7914722cbc08bb90765b410c3e0d7f1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7914722cbc08bb90765b410c3e0d7f1.exe"C:\Users\Admin\AppData\Local\Temp\b7914722cbc08bb90765b410c3e0d7f1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\b7914722cbc08bb90765b410c3e0d7f1.exeC:\Users\Admin\AppData\Local\Temp\b7914722cbc08bb90765b410c3e0d7f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1384
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5042c502f59a8336d9d1624183dfc0534
SHA13c7d5a11677321d79949f4d5eb26a6a59c7a81ad
SHA256efa857587dc1ab5cbe565dfa18c7fcb851e1627e9fb7476e3f9ca945f9847e46
SHA5126c96197c3afe0b937384f1bdef8409662c35858698d6c7e5f4945b467174a9864674c91919e09defa0fe42f97b90a63ecac8f85e6e13e5641b91e8ea128262bb