Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:56
Behavioral task
behavioral1
Sample
bf896b1065c5698c0ea1b48368a8f6e3.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bf896b1065c5698c0ea1b48368a8f6e3.exe
Resource
win10v2004-20240226-en
General
-
Target
bf896b1065c5698c0ea1b48368a8f6e3.exe
-
Size
2.9MB
-
MD5
bf896b1065c5698c0ea1b48368a8f6e3
-
SHA1
71db94f3d498b7aaec30e75fa4578c0703855f99
-
SHA256
296f446785e5396967826c51b635c89f162b9ad5e3d924c8429eac9cbca4c9f3
-
SHA512
e3e653b0124d790306c927e31e57770f7454477f752f1f5742fbcf5b1c59fa7c8a4e39ed9ffe0adf11ca11f53cc82e77efd352ebb8999cd819691afdfa55561a
-
SSDEEP
49152:w4KVL4KfxwBCg9Rd2zpQvVyhYedf+RP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:3KVBzp+VyhYgWRgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1328 bf896b1065c5698c0ea1b48368a8f6e3.exe -
Executes dropped EXE 1 IoCs
pid Process 1328 bf896b1065c5698c0ea1b48368a8f6e3.exe -
resource yara_rule behavioral2/memory/4556-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000002271f-11.dat upx behavioral2/memory/1328-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4556 bf896b1065c5698c0ea1b48368a8f6e3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4556 bf896b1065c5698c0ea1b48368a8f6e3.exe 1328 bf896b1065c5698c0ea1b48368a8f6e3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1328 4556 bf896b1065c5698c0ea1b48368a8f6e3.exe 97 PID 4556 wrote to memory of 1328 4556 bf896b1065c5698c0ea1b48368a8f6e3.exe 97 PID 4556 wrote to memory of 1328 4556 bf896b1065c5698c0ea1b48368a8f6e3.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf896b1065c5698c0ea1b48368a8f6e3.exe"C:\Users\Admin\AppData\Local\Temp\bf896b1065c5698c0ea1b48368a8f6e3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\bf896b1065c5698c0ea1b48368a8f6e3.exeC:\Users\Admin\AppData\Local\Temp\bf896b1065c5698c0ea1b48368a8f6e3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4700
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ecd5e0098426ac3a8a8c65f43a8e6832
SHA150382407cff98f41ed626d7e7f8bc8ed9af3f2a2
SHA2560dab7c166a1cbd1f56020261411767b3c0e8a8e6410b9641a525059a77a0ac70
SHA51245560c5198c7dc24ce8b991ef7c6ffd69826a7aa26ad086c62868689eb903f2c358598116ab6c6d97d7bb64da3f098a7d39c9c6ae9220ef9822a70d13248872c