Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 14:39
Behavioral task
behavioral1
Sample
b7a5faee6f724128d9648825bc816055.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7a5faee6f724128d9648825bc816055.exe
Resource
win10v2004-20240226-en
General
-
Target
b7a5faee6f724128d9648825bc816055.exe
-
Size
5.8MB
-
MD5
b7a5faee6f724128d9648825bc816055
-
SHA1
e71c9a8485a8ca7bbc9b971ce8400a0a57b837eb
-
SHA256
15ff6d16e435608fe942b1a7925b727562beffd702a8300754ba3fe4e6d4f1d1
-
SHA512
4efab002f45dd1b83d6df7ec02aa6a0461cf68cad331922d712b44b83e24c8fbdfa0c2384c08a06a93819f9b6ce9b13044cc7a13a937b5cf1a651e41887b5c9b
-
SSDEEP
98304:8jg3oRUq7QhSNHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:8sOvpauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 b7a5faee6f724128d9648825bc816055.exe -
Executes dropped EXE 1 IoCs
pid Process 1296 b7a5faee6f724128d9648825bc816055.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 b7a5faee6f724128d9648825bc816055.exe -
resource yara_rule behavioral1/memory/2168-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012256-12.dat upx behavioral1/files/0x000b000000012256-10.dat upx behavioral1/files/0x000b000000012256-15.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2168 b7a5faee6f724128d9648825bc816055.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2168 b7a5faee6f724128d9648825bc816055.exe 1296 b7a5faee6f724128d9648825bc816055.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1296 2168 b7a5faee6f724128d9648825bc816055.exe 28 PID 2168 wrote to memory of 1296 2168 b7a5faee6f724128d9648825bc816055.exe 28 PID 2168 wrote to memory of 1296 2168 b7a5faee6f724128d9648825bc816055.exe 28 PID 2168 wrote to memory of 1296 2168 b7a5faee6f724128d9648825bc816055.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7a5faee6f724128d9648825bc816055.exe"C:\Users\Admin\AppData\Local\Temp\b7a5faee6f724128d9648825bc816055.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\b7a5faee6f724128d9648825bc816055.exeC:\Users\Admin\AppData\Local\Temp\b7a5faee6f724128d9648825bc816055.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD561ad28a9b3a0b5079570a454560d8c8a
SHA17ff1b5baa10e57eb332683142725eeb90bd9836c
SHA256015ac3dabdfd230c96d94c928f3ffa117f435f42a6520f2123b1ce3d9f7b9727
SHA5124b0fedb871e5989c5de88258ca5c382d367aad6bf430d71748cda06d8f4b72d5db5b9b5c7954f81704ce53ce18d32ec8added31b002e62baac2ebf081f53440b
-
Filesize
5.8MB
MD504cb7420d0e9d0ef506b11d05ece2447
SHA154dfe5c0f83dff867d2d2960c02360b48dec2490
SHA2560a31dda98a83d588ee22a6c6dbf8de6189071086698fb60266cb5dcd80c47343
SHA512312ba65c0cb76976fc4e476ffeed88454ffade8a0da05cc1eb9995e344eb8307806f4a05c47937467b69ac650d0ef01b0cf358342b0bd54aa4c575647b3304f8
-
Filesize
768KB
MD5413974ae6173b3cb716d058651736060
SHA1059004c8d1301a4277ab49af16dfc695306b131d
SHA256cdf3a4ce09bdcd29cecd76eb6c0426e9f6853a0c9cd13dbd7f418c3291a4e38a
SHA512e9f266863eb60ee45cc87f6ad4ae1c16893a9803accc616e2214044717996a269fcaf40fd882b68cb7334f4ac62bc4f23c497a56a0cb291873073f687750264e