Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
bbef268c974e7e08e8f8ffb7cf3230f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbef268c974e7e08e8f8ffb7cf3230f1.exe
Resource
win10v2004-20240226-en
General
-
Target
bbef268c974e7e08e8f8ffb7cf3230f1.exe
-
Size
82KB
-
MD5
bbef268c974e7e08e8f8ffb7cf3230f1
-
SHA1
b0ad921ae04dc2951644071798e0af272676ab1c
-
SHA256
1a1462b2fa1edfa3e3ae622dd772d15cb79ec9ba2d64b056205a0935da6ccaf8
-
SHA512
b7050d1d019f9ba5f5b80f1f59cca773b1bbdd02f3ef7069b27962b35c4f997cf3cfdc9da086bde287f94dbb28c0b171291a11feb6499fc3e6d5ca4d1f01ba3b
-
SSDEEP
1536:rMTNMDxEnKlA8SAqQzQ5iQcY7G0RnPX0vklzcoMCBFgYfI5V3Lywo:oNAxQt8SAq4Q5iQF7vhMqzchCBFfwTer
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2204 bbef268c974e7e08e8f8ffb7cf3230f1.exe -
Executes dropped EXE 1 IoCs
pid Process 2204 bbef268c974e7e08e8f8ffb7cf3230f1.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe 2204 bbef268c974e7e08e8f8ffb7cf3230f1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2204 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe 29 PID 2808 wrote to memory of 2204 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe 29 PID 2808 wrote to memory of 2204 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe 29 PID 2808 wrote to memory of 2204 2808 bbef268c974e7e08e8f8ffb7cf3230f1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbef268c974e7e08e8f8ffb7cf3230f1.exe"C:\Users\Admin\AppData\Local\Temp\bbef268c974e7e08e8f8ffb7cf3230f1.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\bbef268c974e7e08e8f8ffb7cf3230f1.exeC:\Users\Admin\AppData\Local\Temp\bbef268c974e7e08e8f8ffb7cf3230f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55bd767f242379d7b603ca0bfe8a89c2f
SHA1051183d5f32972729c256af234fcafabd779dd2b
SHA2563bd434c1302c7924da0984fa8ed2a18058639a29ea2882f79f070107ff35e6df
SHA5123e11f73c865539d639bb304e19ab5366312e54dadd46e66a7b1467d14158fbff8f81213cd93577b7844eb48450ff977da597b559a2f93893d5319321aa9fae1d