Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 09:45
Behavioral task
behavioral1
Sample
baefd50ac3176d4e353919a1ad3900c6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
baefd50ac3176d4e353919a1ad3900c6.exe
Resource
win10v2004-20240226-en
General
-
Target
baefd50ac3176d4e353919a1ad3900c6.exe
-
Size
5.8MB
-
MD5
baefd50ac3176d4e353919a1ad3900c6
-
SHA1
2e986a7196e3c65e55150c3b7a8f5e004c8f4f8d
-
SHA256
d0c3706bee3ae7b4490c722ae0661c8e0d1750308a5e90a475f78eda5b9690d7
-
SHA512
3e5c9b812535708f8eb398895ed945e66249fdbf515be828b5cd6ddc3c853e5de26d87ad155801904e064a6740ac1e55df4a507c77d29a3aa9cf6417d1880215
-
SSDEEP
98304:v1kw3LwRsHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:NH3LPauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4652 baefd50ac3176d4e353919a1ad3900c6.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 baefd50ac3176d4e353919a1ad3900c6.exe -
resource yara_rule behavioral2/memory/3932-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000c0000000226fd-11.dat upx behavioral2/memory/4652-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3932 baefd50ac3176d4e353919a1ad3900c6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3932 baefd50ac3176d4e353919a1ad3900c6.exe 4652 baefd50ac3176d4e353919a1ad3900c6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4652 3932 baefd50ac3176d4e353919a1ad3900c6.exe 92 PID 3932 wrote to memory of 4652 3932 baefd50ac3176d4e353919a1ad3900c6.exe 92 PID 3932 wrote to memory of 4652 3932 baefd50ac3176d4e353919a1ad3900c6.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\baefd50ac3176d4e353919a1ad3900c6.exe"C:\Users\Admin\AppData\Local\Temp\baefd50ac3176d4e353919a1ad3900c6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\baefd50ac3176d4e353919a1ad3900c6.exeC:\Users\Admin\AppData\Local\Temp\baefd50ac3176d4e353919a1ad3900c6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5187734e5aa9dd785211980fea697c3dd
SHA1d6fb564d2cda80538caa75a35e3ef269e48a2a8e
SHA256fa60334f87de908ef32405dcdac60976bb42ff6fddbd4320bf76fad684dc7c23
SHA5124c867e10b8e24c03014dbc1d25dfe967558499247dc8741b9edf0f8c6c1dc2b7f6ac06ad3a35eed08bf0dfaf3ed8b11e758d4689a23cef51b4747758504eda25