Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
bae4ab6b143acde1326463ce53a6390a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bae4ab6b143acde1326463ce53a6390a.exe
Resource
win10v2004-20240226-en
General
-
Target
bae4ab6b143acde1326463ce53a6390a.exe
-
Size
84KB
-
MD5
bae4ab6b143acde1326463ce53a6390a
-
SHA1
13ccd0f8f76444a7cbb0a67fbdfc00a66562d6c5
-
SHA256
dc0943d57e76a8f930d58c0a194f0200ecc454b0a087b22c9fbb6f77a5b69f58
-
SHA512
06bb59459ba81139eb79a634f844babcb9bee11846f778d190e52376efffb0cf63b3990d42e6782155e03815130a1c969ca591c7842d2ce7d46f25d82f4aca5c
-
SSDEEP
1536:5ZSj1foNOJNN+zVNl/Wo+k+dvtkMMmFOZ7w60/bzBoUD7ZZTcMkIEg:5MR1N2bl/WDRtkM7AhV0/bzBjDAM1F
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 bae4ab6b143acde1326463ce53a6390a.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 bae4ab6b143acde1326463ce53a6390a.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 bae4ab6b143acde1326463ce53a6390a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 bae4ab6b143acde1326463ce53a6390a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 bae4ab6b143acde1326463ce53a6390a.exe 2648 bae4ab6b143acde1326463ce53a6390a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2648 2112 bae4ab6b143acde1326463ce53a6390a.exe 29 PID 2112 wrote to memory of 2648 2112 bae4ab6b143acde1326463ce53a6390a.exe 29 PID 2112 wrote to memory of 2648 2112 bae4ab6b143acde1326463ce53a6390a.exe 29 PID 2112 wrote to memory of 2648 2112 bae4ab6b143acde1326463ce53a6390a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae4ab6b143acde1326463ce53a6390a.exe"C:\Users\Admin\AppData\Local\Temp\bae4ab6b143acde1326463ce53a6390a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\bae4ab6b143acde1326463ce53a6390a.exeC:\Users\Admin\AppData\Local\Temp\bae4ab6b143acde1326463ce53a6390a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2648
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5297ce4a23c6dc74a2e55a74c53dad11b
SHA11cfcc45b9e465f51174c7d89b7704af4bd367e26
SHA2568ded9dd97f3a4b78293c5348920d1a43675020c3cb7f3665cd3575dde2114794
SHA512875a725a14a6ef2c72c29f532d7e516762e4f17b922d7c517e4fb6060b8aada01cfd4927077bfec8f040142376c3d8f8ac50d1ffaf6983d12fbc68969cd150e6