Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 20:53
Behavioral task
behavioral1
Sample
b82a0e42b0eb0678a07caaf7a0d0a080.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b82a0e42b0eb0678a07caaf7a0d0a080.exe
Resource
win10v2004-20240226-en
General
-
Target
b82a0e42b0eb0678a07caaf7a0d0a080.exe
-
Size
59KB
-
MD5
b82a0e42b0eb0678a07caaf7a0d0a080
-
SHA1
89fb159e755fc102256e364c3f8f38e38a777cb0
-
SHA256
fb0cbdb972cadfc93d73e29f52393295b891651b39f3d543344cff3a2cc059d2
-
SHA512
cbc3d26f4cb5452e48691c41e1a4c030e4e76d85fbf397c016fcbc8396383a1a37933a27083de6820d07bfe4d3f524367510bcaa6992bcfdc676a4414099480c
-
SSDEEP
1536:qfDn0YhvSI0PL2ItwJ/EoLM39pr1qb122j+ObJa:gn0YZPQ2ItwJ/a7w122lbM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 b82a0e42b0eb0678a07caaf7a0d0a080.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 b82a0e42b0eb0678a07caaf7a0d0a080.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe -
resource yara_rule behavioral1/memory/1680-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x000c00000001223a-10.dat upx behavioral1/memory/1680-12-0x0000000000160000-0x000000000019D000-memory.dmp upx behavioral1/memory/3036-17-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe 3036 b82a0e42b0eb0678a07caaf7a0d0a080.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3036 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe 29 PID 1680 wrote to memory of 3036 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe 29 PID 1680 wrote to memory of 3036 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe 29 PID 1680 wrote to memory of 3036 1680 b82a0e42b0eb0678a07caaf7a0d0a080.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82a0e42b0eb0678a07caaf7a0d0a080.exe"C:\Users\Admin\AppData\Local\Temp\b82a0e42b0eb0678a07caaf7a0d0a080.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\b82a0e42b0eb0678a07caaf7a0d0a080.exeC:\Users\Admin\AppData\Local\Temp\b82a0e42b0eb0678a07caaf7a0d0a080.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52fbf7eefcd41e9a9f44a1531d6fe633d
SHA1a291275b04d29ad617d6f89dacaa81b6bb845c7e
SHA256f2fb855e100402d26984831bd6024e04226ac4b18b0e8d961fe4747daa524310
SHA5124e7b19a407ab4b888f83f4840f668e44fcf472250d4e3a034904511f09c4d685c6c35838198d1e40113d41d6b17096f2410c8d6cab0c790b146ba26bf3c5f016