Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 16:53
Behavioral task
behavioral1
Sample
b9316e5c145b0b0d1a59636d9cfa885e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9316e5c145b0b0d1a59636d9cfa885e.exe
Resource
win10v2004-20240226-en
General
-
Target
b9316e5c145b0b0d1a59636d9cfa885e.exe
-
Size
1.5MB
-
MD5
b9316e5c145b0b0d1a59636d9cfa885e
-
SHA1
f1e384374ae3703f2ed94e189b005d31d966923b
-
SHA256
c7859936d11021ebd81407be66bd84ec3d20e67feaf7999836117190684d2a23
-
SHA512
fe7b6dc5dbe5c03e05d2a4194225324bd60ab393fe12d68b07af5f5e86e464aa7bb0c8f8d69abfcc5f80840b83269f6d3491dfaf75612979da03d49b452dc145
-
SSDEEP
24576:XNFBZWwNacWLMKq+X7FjKL4xfnXtdiBIpToyvgHykQW:XbO3Lbq+4QPty+kykQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1132 b9316e5c145b0b0d1a59636d9cfa885e.exe -
Executes dropped EXE 1 IoCs
pid Process 1132 b9316e5c145b0b0d1a59636d9cfa885e.exe -
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e980-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4088 b9316e5c145b0b0d1a59636d9cfa885e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4088 b9316e5c145b0b0d1a59636d9cfa885e.exe 1132 b9316e5c145b0b0d1a59636d9cfa885e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 1132 4088 b9316e5c145b0b0d1a59636d9cfa885e.exe 87 PID 4088 wrote to memory of 1132 4088 b9316e5c145b0b0d1a59636d9cfa885e.exe 87 PID 4088 wrote to memory of 1132 4088 b9316e5c145b0b0d1a59636d9cfa885e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9316e5c145b0b0d1a59636d9cfa885e.exe"C:\Users\Admin\AppData\Local\Temp\b9316e5c145b0b0d1a59636d9cfa885e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\b9316e5c145b0b0d1a59636d9cfa885e.exeC:\Users\Admin\AppData\Local\Temp\b9316e5c145b0b0d1a59636d9cfa885e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1132
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD529870dd3cd58fa5abcc3195a2d099c03
SHA13819bf7cbaa7164ed0a0654b208d8b1b0c95a6e2
SHA25623cf6af3c09cbb314404c0692ec43499b23badf889f42d82e82aea5323e7d3a8
SHA512c9227af909fc4fbbdd2dc605710db238f810749b76562ce4e6eadd2c57a6a3354a8e71e5e07210a4930ea532a78811305ebbd13af8d38bc6a9adb540d9d45cc0