Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 13:36
Behavioral task
behavioral1
Sample
b8db4b638b6b1bbcf19c3338efcb2476.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8db4b638b6b1bbcf19c3338efcb2476.exe
Resource
win10v2004-20240226-en
General
-
Target
b8db4b638b6b1bbcf19c3338efcb2476.exe
-
Size
1.3MB
-
MD5
b8db4b638b6b1bbcf19c3338efcb2476
-
SHA1
ceb25f4ad1c3bc884365f2dcbadaa20384df5496
-
SHA256
a1e7f0bec60e821a0b4d96805fa13acc01fe86e1c8b205504d44cbe8d53ddd3d
-
SHA512
63f9324c20ca29a6ff34274a5d1b611fd80709be59040d6503f80ad25e0a2d18e2f832a1a81c24410ac9ee819ea7613ec6d22307bff291c1184d82572de81795
-
SSDEEP
24576:csuvMsuMd0uPvA7gn9LYfO2bWeMKi2QH97nW2g1c0LF7cisMewHfqVvG:3uksuMfsm9UeeMKIH97W2+c0LNvO0f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 b8db4b638b6b1bbcf19c3338efcb2476.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 b8db4b638b6b1bbcf19c3338efcb2476.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe -
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000a000000012255-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe 2348 b8db4b638b6b1bbcf19c3338efcb2476.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2348 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe 28 PID 2080 wrote to memory of 2348 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe 28 PID 2080 wrote to memory of 2348 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe 28 PID 2080 wrote to memory of 2348 2080 b8db4b638b6b1bbcf19c3338efcb2476.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8db4b638b6b1bbcf19c3338efcb2476.exe"C:\Users\Admin\AppData\Local\Temp\b8db4b638b6b1bbcf19c3338efcb2476.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\b8db4b638b6b1bbcf19c3338efcb2476.exeC:\Users\Admin\AppData\Local\Temp\b8db4b638b6b1bbcf19c3338efcb2476.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5059b660495f84b29d76457515e22132d
SHA179256f9c5a29b0ed504327e0c479f1e6cd099892
SHA256c54f5ddfb5bf3c586661133012ef68755ea3959d30c9df883c1f3919b99d6733
SHA5126adc0d07b5c4911c041cad378958cd5a20abd7edc1315d4b43bdff1cc84e7188428a7f45d7c7a020d8e136911a5b63ea97d3d87ed0b930160b9c679c77d92b8e