Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 05:44
Behavioral task
behavioral1
Sample
baa903b29a866004e4929b60dc728ddb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
baa903b29a866004e4929b60dc728ddb.exe
Resource
win10v2004-20240226-en
General
-
Target
baa903b29a866004e4929b60dc728ddb.exe
-
Size
4.8MB
-
MD5
baa903b29a866004e4929b60dc728ddb
-
SHA1
503f3f6150db9dcc9e9ad5816f73448ff6400de4
-
SHA256
c4701a3d88fa6601ab20c839229c41ef494fac5376b6b035f855c12e80fab7a4
-
SHA512
1b6187f91ab0361d86dbb7f649533574607258c73f2f9ea3e65a30dc0f28651c287db949eb56eda37b5d7f811fa7a2e1819cd4cb6b6a82c8ee0589e800566489
-
SSDEEP
98304:yffr8qYXZGcWtH3Btfgg3gnl/IVUs1jbKG9TdKAl2jzsgg3gnl/IVUs1jr:yfT0YVBtNgl/iBTTdll0zIgl/iBP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1400 baa903b29a866004e4929b60dc728ddb.exe -
Executes dropped EXE 1 IoCs
pid Process 1400 baa903b29a866004e4929b60dc728ddb.exe -
resource yara_rule behavioral2/memory/2312-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx behavioral2/memory/1400-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2312 baa903b29a866004e4929b60dc728ddb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2312 baa903b29a866004e4929b60dc728ddb.exe 1400 baa903b29a866004e4929b60dc728ddb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1400 2312 baa903b29a866004e4929b60dc728ddb.exe 88 PID 2312 wrote to memory of 1400 2312 baa903b29a866004e4929b60dc728ddb.exe 88 PID 2312 wrote to memory of 1400 2312 baa903b29a866004e4929b60dc728ddb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa903b29a866004e4929b60dc728ddb.exe"C:\Users\Admin\AppData\Local\Temp\baa903b29a866004e4929b60dc728ddb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\baa903b29a866004e4929b60dc728ddb.exeC:\Users\Admin\AppData\Local\Temp\baa903b29a866004e4929b60dc728ddb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD531bd15594096f820bd27e7b1c4c93b6b
SHA1a827de8a0dc606c6d814a6ad4a3f69a8fd16975a
SHA25664f1509ce44610eba619c95fe2e51e377de53ad4192c9e2302be661fe6f3e537
SHA512dc3723e425115bcb932f8c5402e47440c94719c8d897d0e8f260efcde37fa2da99ab33e8e90dc42af7debbb6d0fe4942a2682761ef6e44fcbc810beafd804381