Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 21:03
Behavioral task
behavioral1
Sample
b9a6f67f1f6e07a11ab51c510b0c3277.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9a6f67f1f6e07a11ab51c510b0c3277.exe
Resource
win10v2004-20240226-en
General
-
Target
b9a6f67f1f6e07a11ab51c510b0c3277.exe
-
Size
11.7MB
-
MD5
b9a6f67f1f6e07a11ab51c510b0c3277
-
SHA1
8d0fa6352eeed0863246c2e7a82ca2e6fc75ab53
-
SHA256
849bd0b74829f8cace9446568bdbacc033ce7a5234f5472d4ede8ba66c2edae7
-
SHA512
1d7b7c4f20676df9bfd557f0c1fd420c372b4e6bd98e09d5294d47f038e4e0fc1ee8a7b9ffe1dcfcffd59874c4b5d6c537237c7d6b1a1f4063457750be870c41
-
SSDEEP
196608:xeYIQG7upcVU1J/Nkupc8NyQ3upcVU1J/Nkupc:xFc7XVA/aXnQ3XVA/aX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3164 b9a6f67f1f6e07a11ab51c510b0c3277.exe -
Executes dropped EXE 1 IoCs
pid Process 3164 b9a6f67f1f6e07a11ab51c510b0c3277.exe -
resource yara_rule behavioral2/memory/4584-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000800000001db2a-11.dat upx behavioral2/memory/3164-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4584 b9a6f67f1f6e07a11ab51c510b0c3277.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4584 b9a6f67f1f6e07a11ab51c510b0c3277.exe 3164 b9a6f67f1f6e07a11ab51c510b0c3277.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3164 4584 b9a6f67f1f6e07a11ab51c510b0c3277.exe 98 PID 4584 wrote to memory of 3164 4584 b9a6f67f1f6e07a11ab51c510b0c3277.exe 98 PID 4584 wrote to memory of 3164 4584 b9a6f67f1f6e07a11ab51c510b0c3277.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9a6f67f1f6e07a11ab51c510b0c3277.exe"C:\Users\Admin\AppData\Local\Temp\b9a6f67f1f6e07a11ab51c510b0c3277.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\b9a6f67f1f6e07a11ab51c510b0c3277.exeC:\Users\Admin\AppData\Local\Temp\b9a6f67f1f6e07a11ab51c510b0c3277.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:81⤵PID:3088
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD556a9940aa5ecc1ce517f40389a1a913c
SHA11639afb86582f84b934b4931f736c954727e3401
SHA25643169c27f55713e19420b21828b3ec5f6dce9632dacc54e58090956540de73ad
SHA51229407a600704a4a64280504055e73589f5832a9d342943bc507651061d4cab0d831bb8b134e93a2117cea921cb90a2eca5c471c9d6c6bb3f0f5cbab4b7977545