Analysis
-
max time kernel
24s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
bd419130bd01e36a598eb05de12bc73a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd419130bd01e36a598eb05de12bc73a.exe
Resource
win10v2004-20240226-en
General
-
Target
bd419130bd01e36a598eb05de12bc73a.exe
-
Size
82KB
-
MD5
bd419130bd01e36a598eb05de12bc73a
-
SHA1
5716230757607348daf055d5dcf0f530bbe439bb
-
SHA256
1357f5035da1acd4d9615425f6adcf34c5432307c03ac0842020e7f6b2efad2e
-
SHA512
9451176733fbfea93ead2c2369dce1f779895d930fb48e03a6c2ad90ad7a74486c65e8d7d69838157a741a733331f544e20dc32f551d809a55ee73945d8ff226
-
SSDEEP
1536:nsoH/Q+m4kgPFVrvJCcVVC4dOQap3xchXMVIe7HXx4+iBPIJIcKJdZX+1vCqMRA/:nsu/Q+m4k+FBvZMb3OhcFXxsIJFKJzIt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1724 bd419130bd01e36a598eb05de12bc73a.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 bd419130bd01e36a598eb05de12bc73a.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 bd419130bd01e36a598eb05de12bc73a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2492 bd419130bd01e36a598eb05de12bc73a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2492 bd419130bd01e36a598eb05de12bc73a.exe 1724 bd419130bd01e36a598eb05de12bc73a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1724 2492 bd419130bd01e36a598eb05de12bc73a.exe 29 PID 2492 wrote to memory of 1724 2492 bd419130bd01e36a598eb05de12bc73a.exe 29 PID 2492 wrote to memory of 1724 2492 bd419130bd01e36a598eb05de12bc73a.exe 29 PID 2492 wrote to memory of 1724 2492 bd419130bd01e36a598eb05de12bc73a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd419130bd01e36a598eb05de12bc73a.exe"C:\Users\Admin\AppData\Local\Temp\bd419130bd01e36a598eb05de12bc73a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\bd419130bd01e36a598eb05de12bc73a.exeC:\Users\Admin\AppData\Local\Temp\bd419130bd01e36a598eb05de12bc73a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1724
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5ebc883bcce954825e29491dca5fde9a8
SHA1fa4274926301aa549fbec16cef89c6a15f7048f2
SHA256a7b529b0b970e638111112cdebaf9dee9b68d5fb6eaa87d1bd6f3565ec5ac0bf
SHA5124a96afc14e78c140926a8580c2583fff96781576c90b97b35c9789d6867010b9a255912a874cdc217e792b91c6438712ad40384d807001c2116e8a2b56b51823