Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 16:48
Behavioral task
behavioral1
Sample
b92ec5bc625a20dc2057d1c04e27a266.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b92ec5bc625a20dc2057d1c04e27a266.exe
Resource
win10v2004-20240226-en
General
-
Target
b92ec5bc625a20dc2057d1c04e27a266.exe
-
Size
2.9MB
-
MD5
b92ec5bc625a20dc2057d1c04e27a266
-
SHA1
e9f428d7676f6bb408ea608608332573a8ea2f15
-
SHA256
ee46582ae0440af4246e14c3aacc33d55359906f663daa4d074b1f4cf0238677
-
SHA512
c7e42f1db7448a1e5e311ad06942094d6ed15c1c2b07a8cb4081aa91e80d00d9d7bee4d1c05704520f8d995770d82469629e7b5b1df639391e4f9c826d68ff72
-
SSDEEP
49152:THzqtPiqd1jlK/WanEcCXtIcgP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:QqqHxK/WPagg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 b92ec5bc625a20dc2057d1c04e27a266.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 b92ec5bc625a20dc2057d1c04e27a266.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 b92ec5bc625a20dc2057d1c04e27a266.exe -
resource yara_rule behavioral1/memory/1600-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012252-10.dat upx behavioral1/memory/1600-14-0x00000000038B0000-0x0000000003D9F000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1600 b92ec5bc625a20dc2057d1c04e27a266.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1600 b92ec5bc625a20dc2057d1c04e27a266.exe 2988 b92ec5bc625a20dc2057d1c04e27a266.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2988 1600 b92ec5bc625a20dc2057d1c04e27a266.exe 28 PID 1600 wrote to memory of 2988 1600 b92ec5bc625a20dc2057d1c04e27a266.exe 28 PID 1600 wrote to memory of 2988 1600 b92ec5bc625a20dc2057d1c04e27a266.exe 28 PID 1600 wrote to memory of 2988 1600 b92ec5bc625a20dc2057d1c04e27a266.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b92ec5bc625a20dc2057d1c04e27a266.exe"C:\Users\Admin\AppData\Local\Temp\b92ec5bc625a20dc2057d1c04e27a266.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\b92ec5bc625a20dc2057d1c04e27a266.exeC:\Users\Admin\AppData\Local\Temp\b92ec5bc625a20dc2057d1c04e27a266.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD52e701875c9ebb61fdbc3f64aa29047e7
SHA1fb58843ac127b28c509bb87fafc442a1e1238f31
SHA256a79141f445b14219713efd5fcdddf35c5a7b0451626de9dcddc6858bd60b41ba
SHA5127b511e9d8c795c6f40ef50cac9077e655826f85f9e4b773dbd2829b7064ae94f491ae1e40bb64cdb3c22e229a15b628b54bc43d9e73e075f6c8206a04d2ef590