Analysis
-
max time kernel
167s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 21:57
Behavioral task
behavioral1
Sample
bce7f536a818ea313d2c76904a0e646f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bce7f536a818ea313d2c76904a0e646f.exe
Resource
win10v2004-20240226-en
General
-
Target
bce7f536a818ea313d2c76904a0e646f.exe
-
Size
59KB
-
MD5
bce7f536a818ea313d2c76904a0e646f
-
SHA1
c2c255b505789b1caa2ad126ba5b13101eedc030
-
SHA256
f7437019bb9bc0d87483650a6c4fdf6cae5ce03e353fa76625afbb706415b266
-
SHA512
160f0a8d2a71b282f3cf06ecfabb94cc9f1c6956774b1b7d5063c0028f90742aa13bef21453d359693de0d7639b87386fa0643b09336ac521dfe39319d1f959b
-
SSDEEP
1536:5YM9RXi5jLHxtgCS9y9p5T126+aGphZN4QbOl:5Y3RdS9y97T1EhZbb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4824 bce7f536a818ea313d2c76904a0e646f.exe -
Executes dropped EXE 1 IoCs
pid Process 4824 bce7f536a818ea313d2c76904a0e646f.exe -
resource yara_rule behavioral2/memory/216-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x0008000000023212-11.dat upx behavioral2/memory/4824-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 216 bce7f536a818ea313d2c76904a0e646f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 216 bce7f536a818ea313d2c76904a0e646f.exe 4824 bce7f536a818ea313d2c76904a0e646f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 4824 216 bce7f536a818ea313d2c76904a0e646f.exe 91 PID 216 wrote to memory of 4824 216 bce7f536a818ea313d2c76904a0e646f.exe 91 PID 216 wrote to memory of 4824 216 bce7f536a818ea313d2c76904a0e646f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bce7f536a818ea313d2c76904a0e646f.exe"C:\Users\Admin\AppData\Local\Temp\bce7f536a818ea313d2c76904a0e646f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\bce7f536a818ea313d2c76904a0e646f.exeC:\Users\Admin\AppData\Local\Temp\bce7f536a818ea313d2c76904a0e646f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD581d5fd44af54fdc2e4ca57748211366d
SHA19723dcc8cd181c4008fe414f35202d7fd03e0239
SHA2562b7e483777abb7a7bb4820375680a37a4bfc1884c747c4458b89876b145ebbde
SHA5127263a2d4882440c4d7c6a25d8ddce213e1fde1c576e1f5732ce2d6aba046ad550a70ef9145b44f88014610747a75b01cf3ba5bef3abce366a8b1cac85dc96485