Analysis
-
max time kernel
156s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 09:49
Behavioral task
behavioral1
Sample
baf18fb2a1051c4e22693e23bd001c67.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
baf18fb2a1051c4e22693e23bd001c67.exe
Resource
win10v2004-20240226-en
General
-
Target
baf18fb2a1051c4e22693e23bd001c67.exe
-
Size
1.5MB
-
MD5
baf18fb2a1051c4e22693e23bd001c67
-
SHA1
4e8387e8ebaf962a1832ad240bd3880b11d16157
-
SHA256
baae71c38e82b7eecce5a3802a40307fa7f7ae2f2dd7bc5b3748b865003087ed
-
SHA512
2a6c8afafa62d29d876e75c5136e6d2df1473b419b3e56263386a9209d4d055b23673775cb9f5c6a13d1b47ee1a114cc0b9abe72552cd3abe59f602861dfa241
-
SSDEEP
24576:C13GpGTCk9L+IrF3UJOGYC+y4iRwraouCKsVOrlhm9rXtlodWi8W:UGu7RkJl+y4iRwOouowvm9plji8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 628 baf18fb2a1051c4e22693e23bd001c67.exe -
Executes dropped EXE 1 IoCs
pid Process 628 baf18fb2a1051c4e22693e23bd001c67.exe -
resource yara_rule behavioral2/memory/3504-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000002271f-11.dat upx behavioral2/memory/628-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3504 baf18fb2a1051c4e22693e23bd001c67.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3504 baf18fb2a1051c4e22693e23bd001c67.exe 628 baf18fb2a1051c4e22693e23bd001c67.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 628 3504 baf18fb2a1051c4e22693e23bd001c67.exe 97 PID 3504 wrote to memory of 628 3504 baf18fb2a1051c4e22693e23bd001c67.exe 97 PID 3504 wrote to memory of 628 3504 baf18fb2a1051c4e22693e23bd001c67.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf18fb2a1051c4e22693e23bd001c67.exe"C:\Users\Admin\AppData\Local\Temp\baf18fb2a1051c4e22693e23bd001c67.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\baf18fb2a1051c4e22693e23bd001c67.exeC:\Users\Admin\AppData\Local\Temp\baf18fb2a1051c4e22693e23bd001c67.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4288
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD54184f6cdd210184a9eccb5533bbbdb1a
SHA1fac4e35e78ec9f6f77b1c7e0e46f40c7bdf52777
SHA256fd9ddbaeddb59a35b07a1ba39b27a93c6c57d6b4c99de91fdacd8007c3568b3c
SHA51230ade1399af0ca9816f51b742b15dc2775e01af1aa431e44f184e0e094cdd504d52589fdec0c3da2909dbc136f11c981ec076d80ccae1bcf3d0b147c0729b940