Analysis
-
max time kernel
90s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
b97fa788c20eff073dd329e4a01b1fc2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b97fa788c20eff073dd329e4a01b1fc2.exe
Resource
win10v2004-20231215-en
General
-
Target
b97fa788c20eff073dd329e4a01b1fc2.exe
-
Size
82KB
-
MD5
b97fa788c20eff073dd329e4a01b1fc2
-
SHA1
c73d9f8187cc0fd2fba86c82480843233946e0c5
-
SHA256
24bbf58489ba31224ed2a3ba10aa830e822525df22295fd57d3be63d2bfc1a91
-
SHA512
289fffc81e970b8138d8a13fc062d683567f50bd0a32b5aefd1822e8733a9e5599cc2ed2cb55d01bb1f74d803ae5032c58698b9b760adca5ef52d612518bfca2
-
SSDEEP
1536:nfeq2MMn0oqg1IO86ksIR3WMRAnLfJ6fRUaBdXdbPLgL0WU:nGqdW7a6ksODRGLgBbB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3640 b97fa788c20eff073dd329e4a01b1fc2.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 b97fa788c20eff073dd329e4a01b1fc2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4420 b97fa788c20eff073dd329e4a01b1fc2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4420 b97fa788c20eff073dd329e4a01b1fc2.exe 3640 b97fa788c20eff073dd329e4a01b1fc2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3640 4420 b97fa788c20eff073dd329e4a01b1fc2.exe 86 PID 4420 wrote to memory of 3640 4420 b97fa788c20eff073dd329e4a01b1fc2.exe 86 PID 4420 wrote to memory of 3640 4420 b97fa788c20eff073dd329e4a01b1fc2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b97fa788c20eff073dd329e4a01b1fc2.exe"C:\Users\Admin\AppData\Local\Temp\b97fa788c20eff073dd329e4a01b1fc2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\b97fa788c20eff073dd329e4a01b1fc2.exeC:\Users\Admin\AppData\Local\Temp\b97fa788c20eff073dd329e4a01b1fc2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD58bb61d12a59cba124bef08168c39f5ad
SHA1249bf1159bde363a628a70f04ae264aa9d677f5c
SHA256643fe616dfae14c57a3a6221b631c9a5e2af4904097ff4adb2dea0496aed2f55
SHA512284193edd97b18ca6de8c83e02d78896ba4373d543ced5b2dce7398b5a06d3be01afcad13ca2c2ac98ccdc778c207d127efa9f59c70b995ccce26f5de733410b