Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 03:02
Behavioral task
behavioral1
Sample
bd802f5a6036c0b884eeabbb2cfd7973.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd802f5a6036c0b884eeabbb2cfd7973.exe
Resource
win10v2004-20231215-en
General
-
Target
bd802f5a6036c0b884eeabbb2cfd7973.exe
-
Size
2.7MB
-
MD5
bd802f5a6036c0b884eeabbb2cfd7973
-
SHA1
0cfe5439721f8f4014b936adc0680e10b742f217
-
SHA256
5f45eafd67a69f292f2abef051204ed531aeb41af96cd9c89c403383c6823459
-
SHA512
d4701770fa053bf2e33c0812e54a3a9e458f1758e109202451885adb58f0364d519dad74d18102c0ae28aba8f47b6f9761025690a6e9d020a666fc1b12e6530d
-
SSDEEP
49152:EznAyE26+GRIeOeaA/ZVQh4fKWwkHkETaYSONmqMQOwBcfp:EjFBLYjO2gh4fKBkHPR7NtvOw2fp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1336 bd802f5a6036c0b884eeabbb2cfd7973.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 bd802f5a6036c0b884eeabbb2cfd7973.exe -
Loads dropped DLL 1 IoCs
pid Process 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe -
resource yara_rule behavioral1/memory/1912-2-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000800000001222c-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe 1336 bd802f5a6036c0b884eeabbb2cfd7973.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1336 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe 28 PID 1912 wrote to memory of 1336 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe 28 PID 1912 wrote to memory of 1336 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe 28 PID 1912 wrote to memory of 1336 1912 bd802f5a6036c0b884eeabbb2cfd7973.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd802f5a6036c0b884eeabbb2cfd7973.exe"C:\Users\Admin\AppData\Local\Temp\bd802f5a6036c0b884eeabbb2cfd7973.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\bd802f5a6036c0b884eeabbb2cfd7973.exeC:\Users\Admin\AppData\Local\Temp\bd802f5a6036c0b884eeabbb2cfd7973.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1336
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57610c0c59f518a52b3fb94e37b82053c
SHA18cc7c3195b3f7e95767e637b1b553743ebdf577d
SHA2566e54e1be2dfc3d51492fae73efda2417800cb4361b6ea229a0dc4676bdc0d886
SHA5129c9e46f6f99ff76b5ae8763e2f367a36e66062df96a233571f5da4a694956ae2ca2e4429fbb8189f5655750695a0484b291b8415595c2f25c32502b3fd3765ee