Analysis
-
max time kernel
144s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 21:48
Behavioral task
behavioral1
Sample
c1af976e15b3c0f4afdaf12ba85bad46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1af976e15b3c0f4afdaf12ba85bad46.exe
Resource
win10v2004-20240226-en
General
-
Target
c1af976e15b3c0f4afdaf12ba85bad46.exe
-
Size
2.7MB
-
MD5
c1af976e15b3c0f4afdaf12ba85bad46
-
SHA1
af07838ac47e82b77c81f513c94b320655499ce1
-
SHA256
d08ebe72956585e4404201904251d0c498469603003b73a26fb0550137835779
-
SHA512
59772ec499b00cf2cfd7a7f28429f8de2a17cf47e2cdec0dee33bb7df652a1f07f919c0ce42c83e6fab4f4e0b7ad0f52403d3d0994616b06cfb881b2dd237a7d
-
SSDEEP
49152:7GT3V6JfmviGtwjjJDd5BaNEjZgjhU2g1cn0SPrr/SzURJZEiJmPlTqijO9UTlIp:7GTlEuviGEONmgjJ+c0SPrr17DfijO9J
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4000 c1af976e15b3c0f4afdaf12ba85bad46.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 c1af976e15b3c0f4afdaf12ba85bad46.exe -
resource yara_rule behavioral2/memory/4624-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00030000000227e7-11.dat upx behavioral2/memory/4000-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4624 c1af976e15b3c0f4afdaf12ba85bad46.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4624 c1af976e15b3c0f4afdaf12ba85bad46.exe 4000 c1af976e15b3c0f4afdaf12ba85bad46.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4000 4624 c1af976e15b3c0f4afdaf12ba85bad46.exe 99 PID 4624 wrote to memory of 4000 4624 c1af976e15b3c0f4afdaf12ba85bad46.exe 99 PID 4624 wrote to memory of 4000 4624 c1af976e15b3c0f4afdaf12ba85bad46.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1af976e15b3c0f4afdaf12ba85bad46.exe"C:\Users\Admin\AppData\Local\Temp\c1af976e15b3c0f4afdaf12ba85bad46.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\c1af976e15b3c0f4afdaf12ba85bad46.exeC:\Users\Admin\AppData\Local\Temp\c1af976e15b3c0f4afdaf12ba85bad46.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3376 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:2684
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD544815e5a6fd7b9422fae14801a1751e8
SHA11818cefd3e95d42b93bab71ede4df599537c4552
SHA2561b9ae9c6daaac2b7eae1e1534c35416b5651bddd643e93817d3d140e053fc7a0
SHA5123b414bbb6c826488b96b1a537a1dde3d145ee4e2aeac1525445829fd95a85656e0c6c7166eb5aea3d347ae5fe5f146d8f6dac68554664e418050a0a9d9e19e4e