Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:27
Behavioral task
behavioral1
Sample
bf7b5728be68db045bc7f5e6843a0cc1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf7b5728be68db045bc7f5e6843a0cc1.exe
Resource
win10v2004-20240226-en
General
-
Target
bf7b5728be68db045bc7f5e6843a0cc1.exe
-
Size
1.5MB
-
MD5
bf7b5728be68db045bc7f5e6843a0cc1
-
SHA1
ae7b0d34fe8845f01458c5d8699f168ef2c0e30a
-
SHA256
48b0d3bc71592e7e600d4abb8ea8e08a6f104cb7cc22f0ee0c0ffa220ce5beb7
-
SHA512
fcd282e966239b645efb6be8b0d778066791860f2cbdce6a4990846fce59b709011cbc1f477467cab5cb10714780c39df30aabf2a6e44c483e0e9a0bd2f57d4d
-
SSDEEP
24576:OiKDymylI32onbAG3D4TQa0YLRm+6m3+jH5SYMxmKX6nTXBTW:day8mon5MTQ5Ytj6+EHfMAlnTXBT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3752 bf7b5728be68db045bc7f5e6843a0cc1.exe -
Executes dropped EXE 1 IoCs
pid Process 3752 bf7b5728be68db045bc7f5e6843a0cc1.exe -
resource yara_rule behavioral2/memory/4864-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000023209-11.dat upx behavioral2/memory/3752-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 bf7b5728be68db045bc7f5e6843a0cc1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4864 bf7b5728be68db045bc7f5e6843a0cc1.exe 3752 bf7b5728be68db045bc7f5e6843a0cc1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3752 4864 bf7b5728be68db045bc7f5e6843a0cc1.exe 90 PID 4864 wrote to memory of 3752 4864 bf7b5728be68db045bc7f5e6843a0cc1.exe 90 PID 4864 wrote to memory of 3752 4864 bf7b5728be68db045bc7f5e6843a0cc1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7b5728be68db045bc7f5e6843a0cc1.exe"C:\Users\Admin\AppData\Local\Temp\bf7b5728be68db045bc7f5e6843a0cc1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\bf7b5728be68db045bc7f5e6843a0cc1.exeC:\Users\Admin\AppData\Local\Temp\bf7b5728be68db045bc7f5e6843a0cc1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD53510dff2c654bc53f4a0f0a11c6dce65
SHA127003a8dd549bd31ecee3d522d1c4623ee1b1f6c
SHA256363c8e2fbf69d4f669982cfeda3107ad6cc4ce09fb92ece253c7f4877c7b6e03
SHA5126661e891b71e4d44d7daf222b73aea247b99b909f534cb7652f8606af5fd8ef2cb97bf42071f0e028ee2a38165826763a76c640cdadba6f74ae78e786e18266d