Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 19:51
Behavioral task
behavioral1
Sample
b9822d79aceec25846f854a9895424d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9822d79aceec25846f854a9895424d9.exe
Resource
win10v2004-20240226-en
General
-
Target
b9822d79aceec25846f854a9895424d9.exe
-
Size
2.4MB
-
MD5
b9822d79aceec25846f854a9895424d9
-
SHA1
5dabb80b0ba5afc09f8499467877ba9048125e89
-
SHA256
2b29a55fd33f11abae79b2ab242c607bc13bd1b93a53be8c6ce6d68c7ffee149
-
SHA512
f2ae93ea57d1a8de2549452403ccac39cb08fe09e7a4121a3cb6505047f481cbcec70c73bb4f5c0f3b259b16a8f79da8445e2d9243a4ed28c732bc96c974c202
-
SSDEEP
49152:Ku02FZ+cIBhVH8zqmPPD+vrP4M338dB2IBlGuuDVUsdxxjr:0c+P/cmmXDQgg3gnl/IVUs1jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 b9822d79aceec25846f854a9895424d9.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 b9822d79aceec25846f854a9895424d9.exe -
resource yara_rule behavioral2/memory/2960-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e5eb-11.dat upx behavioral2/memory/4584-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2960 b9822d79aceec25846f854a9895424d9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2960 b9822d79aceec25846f854a9895424d9.exe 4584 b9822d79aceec25846f854a9895424d9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4584 2960 b9822d79aceec25846f854a9895424d9.exe 88 PID 2960 wrote to memory of 4584 2960 b9822d79aceec25846f854a9895424d9.exe 88 PID 2960 wrote to memory of 4584 2960 b9822d79aceec25846f854a9895424d9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9822d79aceec25846f854a9895424d9.exe"C:\Users\Admin\AppData\Local\Temp\b9822d79aceec25846f854a9895424d9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\b9822d79aceec25846f854a9895424d9.exeC:\Users\Admin\AppData\Local\Temp\b9822d79aceec25846f854a9895424d9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5a5a12cafc0554427b62a2bb5c10f0e70
SHA14ed7ade98419aa5cb367c11e806ae9cbaf4c45b1
SHA25600c07e6b8625f88f42fec9b8bf65ac28934addadb4edcb4392a3aacf8eb6f749
SHA512b2e4866e3ef2988c29ec3cdd0e191e39f2436f62847220d226a0b92283474ce085f78b1939fb5b33f1ddae33abff76e98cfc8e6cae56f2f410765e6e621f31d3