Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 08:48
Behavioral task
behavioral1
Sample
b852e23d5e5f8c80ea2187336c9b95a3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b852e23d5e5f8c80ea2187336c9b95a3.exe
Resource
win10v2004-20240226-en
General
-
Target
b852e23d5e5f8c80ea2187336c9b95a3.exe
-
Size
1.3MB
-
MD5
b852e23d5e5f8c80ea2187336c9b95a3
-
SHA1
f17c1cd428c6605877ecbbccf3ec50ba0a03955d
-
SHA256
fe6475d85c6bb7b8da27ff83d93753eae3c4759b68aea7ae6570ec8b59fd1d6f
-
SHA512
5f7806034e8a4da1992c6b114e519cc917e8a7596c18472f2f749034420921926e77647b36ff804f3f2dc81bfb0f6df26c7ea9e1d7a645151e4ccd83063c275b
-
SSDEEP
24576:ytUZ8Ql38qCKbZzRliIqaLeyWbhJmYiHiTQHHIaUwYDUDN5pVVHWO:ytUZvh9zM2ohwYI1HoI+U/XZf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2900 b852e23d5e5f8c80ea2187336c9b95a3.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 b852e23d5e5f8c80ea2187336c9b95a3.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe -
resource yara_rule behavioral1/memory/2064-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012251-10.dat upx behavioral1/memory/2900-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe 2900 b852e23d5e5f8c80ea2187336c9b95a3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2900 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe 28 PID 2064 wrote to memory of 2900 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe 28 PID 2064 wrote to memory of 2900 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe 28 PID 2064 wrote to memory of 2900 2064 b852e23d5e5f8c80ea2187336c9b95a3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b852e23d5e5f8c80ea2187336c9b95a3.exe"C:\Users\Admin\AppData\Local\Temp\b852e23d5e5f8c80ea2187336c9b95a3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\b852e23d5e5f8c80ea2187336c9b95a3.exeC:\Users\Admin\AppData\Local\Temp\b852e23d5e5f8c80ea2187336c9b95a3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2900
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53ab28228125a3d009df1c1cf83e474b8
SHA12b888b4e6b99e951581af02356731bf855f4e28e
SHA25644977b1ad97a0fa1097231710b7c5a1b09dc5fedd332be6d2eb94ad19ea0d4ed
SHA51211c0d54787b8ffaefa01a0e32c4335cee629208dcd77a3b23bfa7b668d21ee8430df7c77ce798268f5a915c6840af5f80572f2d5007886a7674d8a6b473fcdcf