Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 18:02
Behavioral task
behavioral1
Sample
b80693f08cebc222f14e25000cb42387.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b80693f08cebc222f14e25000cb42387.exe
Resource
win10v2004-20240226-en
General
-
Target
b80693f08cebc222f14e25000cb42387.exe
-
Size
2.7MB
-
MD5
b80693f08cebc222f14e25000cb42387
-
SHA1
462821fcfa299cd0a3694587b5d9dad43dca77c2
-
SHA256
3ae7706fb5bab9733315fd88cb4bf6461def1383d88e971ce22dfe9842c142a8
-
SHA512
3b23edb0cf2f190755c196dbbdd8bfea9bf0e55988ac8744585187953e0aff54f0898a9355b2ae8ee15f89d6bd14f2b97cf7fb5c3665b061a54a4c9e32216c9d
-
SSDEEP
49152:zHvTKXhUvqKnHa7BN6vmzyHpX/rgeo0op/9sxrjskruVmtp:zHLKRUvqKnGBYuzyHpPrgCc/9slYkKVW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 b80693f08cebc222f14e25000cb42387.exe -
Executes dropped EXE 1 IoCs
pid Process 1932 b80693f08cebc222f14e25000cb42387.exe -
Loads dropped DLL 1 IoCs
pid Process 2916 b80693f08cebc222f14e25000cb42387.exe -
resource yara_rule behavioral1/memory/2916-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012251-10.dat upx behavioral1/memory/1932-15-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2916 b80693f08cebc222f14e25000cb42387.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2916 b80693f08cebc222f14e25000cb42387.exe 1932 b80693f08cebc222f14e25000cb42387.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1932 2916 b80693f08cebc222f14e25000cb42387.exe 28 PID 2916 wrote to memory of 1932 2916 b80693f08cebc222f14e25000cb42387.exe 28 PID 2916 wrote to memory of 1932 2916 b80693f08cebc222f14e25000cb42387.exe 28 PID 2916 wrote to memory of 1932 2916 b80693f08cebc222f14e25000cb42387.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b80693f08cebc222f14e25000cb42387.exe"C:\Users\Admin\AppData\Local\Temp\b80693f08cebc222f14e25000cb42387.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\b80693f08cebc222f14e25000cb42387.exeC:\Users\Admin\AppData\Local\Temp\b80693f08cebc222f14e25000cb42387.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57fb24ade8af204b64b8fb3b5d9765673
SHA197b93a64cbf9e194d8c21d50a06965913770b849
SHA2569496f1ba1a40f518eb3564d9b8e52123765450bb7086a0ad4c69efc5c40a2322
SHA51260b3fbb8ab681d823b39b09f2ffbe40cb8dd94e1e1bd1481eb86f8205e5b59f3c6ff44a2c93b5887f4e870b267a7bd0c4321557547f18bb03a888d7c4fbe72b8