Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
bfe5a46b3d6161aa72c2af5e42265d6f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfe5a46b3d6161aa72c2af5e42265d6f.exe
Resource
win10v2004-20240226-en
General
-
Target
bfe5a46b3d6161aa72c2af5e42265d6f.exe
-
Size
1.9MB
-
MD5
bfe5a46b3d6161aa72c2af5e42265d6f
-
SHA1
557d9615ba0ee0aeb23dc541ff81685236014c92
-
SHA256
ab93f03235162bb57ba068d2aced59f0285557f48832f395c3974976e7859e40
-
SHA512
99189744d03b16d00c4d7edb0d085ae290021760c29658d8e23ed7206b8a735f901107caf20b87d550d09c1f33248da18c0b1aecde5c80bb2d1a390777dc5298
-
SSDEEP
49152:Qoa1taC070d4ShWdldmqdLlXxT+x+h/0DeH:Qoa1taC0MAzYqdJX6U/0a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 63B3.tmp -
Executes dropped EXE 1 IoCs
pid Process 1636 63B3.tmp -
Loads dropped DLL 1 IoCs
pid Process 2856 bfe5a46b3d6161aa72c2af5e42265d6f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1636 2856 bfe5a46b3d6161aa72c2af5e42265d6f.exe 28 PID 2856 wrote to memory of 1636 2856 bfe5a46b3d6161aa72c2af5e42265d6f.exe 28 PID 2856 wrote to memory of 1636 2856 bfe5a46b3d6161aa72c2af5e42265d6f.exe 28 PID 2856 wrote to memory of 1636 2856 bfe5a46b3d6161aa72c2af5e42265d6f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe5a46b3d6161aa72c2af5e42265d6f.exe"C:\Users\Admin\AppData\Local\Temp\bfe5a46b3d6161aa72c2af5e42265d6f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\63B3.tmp"C:\Users\Admin\AppData\Local\Temp\63B3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\bfe5a46b3d6161aa72c2af5e42265d6f.exe E585DD73EF538ADD1E5859593CA39BE8BA897CCF5A3B08E6DC72F29702949B710911BF63A4492C05C0AB89F1EE175BB52A7BA23BF74B98DB218026BB13B524562⤵
- Deletes itself
- Executes dropped EXE
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59f147d807fbfe137553f8b6c4c01633f
SHA1e9b1ba3c7543523f2bb0caaa5500930b6bd7ca5f
SHA256d349a760a10d882951f93268c4b2d32001a9d0fee96d3af9350345bd0e0f1bd2
SHA512226d054ababcd9c49717b8080a3d462afe500f057fa291ba8cfe470e99f5e8ab69cb90efdc33a6df504694ddff3f11f9e093702d3471cbb838bfdb236d6e9445