Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 15:41
Behavioral task
behavioral1
Sample
bba185a5b0ab04f3c58ad28503d81ae5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bba185a5b0ab04f3c58ad28503d81ae5.exe
Resource
win10v2004-20240226-en
General
-
Target
bba185a5b0ab04f3c58ad28503d81ae5.exe
-
Size
2.9MB
-
MD5
bba185a5b0ab04f3c58ad28503d81ae5
-
SHA1
c02c2ddaeaebfb490879902f516ad3914e3373b4
-
SHA256
2ded396ca097e42f3658f8515d495723eae49159ccf20d305a584f92788b965a
-
SHA512
61e7683e9f9b838f1c3e4cb5fb85bd5d3e1fd8d146fe5b2d6f6f5970ce07c47a783ffcbbec59e0238bdbb925a41776563e2abfed49d4bed6e9284b7e967ee61f
-
SSDEEP
49152:quShkNkF+m1V/uS7RwmwWMT6iNoN74NH5HUyNRcUsCVOzetdZJ:quS+NkF+mV/v1wmwJOKo4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3604 bba185a5b0ab04f3c58ad28503d81ae5.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 bba185a5b0ab04f3c58ad28503d81ae5.exe -
resource yara_rule behavioral2/memory/1836-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000500000002271f-11.dat upx behavioral2/memory/3604-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1836 bba185a5b0ab04f3c58ad28503d81ae5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 bba185a5b0ab04f3c58ad28503d81ae5.exe 3604 bba185a5b0ab04f3c58ad28503d81ae5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3604 1836 bba185a5b0ab04f3c58ad28503d81ae5.exe 98 PID 1836 wrote to memory of 3604 1836 bba185a5b0ab04f3c58ad28503d81ae5.exe 98 PID 1836 wrote to memory of 3604 1836 bba185a5b0ab04f3c58ad28503d81ae5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba185a5b0ab04f3c58ad28503d81ae5.exe"C:\Users\Admin\AppData\Local\Temp\bba185a5b0ab04f3c58ad28503d81ae5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\bba185a5b0ab04f3c58ad28503d81ae5.exeC:\Users\Admin\AppData\Local\Temp\bba185a5b0ab04f3c58ad28503d81ae5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4804
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5360850f5bdb7911bdc3d9be1f4c39d1f
SHA1221f565cbc8e4b8f7d5c5fa41febfe004560d13e
SHA2569583283a5b66c621ee2e0e63cf44cef3832e68294180a22844f43bb0f435ead5
SHA51201a023134769d6e018d53191b60acaddf8e0add5b50bcbfe7f4caaaed839a393c210841ea0592a5bb9279f17bcda04218c4ade164e32cda7f369362532dbba8b