Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 05:04
Behavioral task
behavioral1
Sample
bfe98ccf1fe3f9c43af64cbf1dda9812.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfe98ccf1fe3f9c43af64cbf1dda9812.exe
Resource
win10v2004-20240226-en
General
-
Target
bfe98ccf1fe3f9c43af64cbf1dda9812.exe
-
Size
5.3MB
-
MD5
bfe98ccf1fe3f9c43af64cbf1dda9812
-
SHA1
64cade40efbecb4544632361053b6dea231161da
-
SHA256
6cc2d36569d8b62e94c88f958ff7bffa0a6ccaf2f2aa2045d2aae591565e1c13
-
SHA512
36caae92fc0ca30aacf5bbb40e25ca510b0b9ff3cd683bceaf06ecbdfefd449b2bd328598e35f9084bea69df0adce2a9e5413c5cdff8e5084c2959e663719f74
-
SSDEEP
98304:Q5PxIudMWRD6eiEtmBm5zBqX5EglAqrn5OIQiHBGn5HOMJesq4ArQP0YBqX5EglZ:QNx25eFLgOqrn5OoG59e2Am0+gOqrn5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 bfe98ccf1fe3f9c43af64cbf1dda9812.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 bfe98ccf1fe3f9c43af64cbf1dda9812.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe -
resource yara_rule behavioral1/memory/1152-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012241-10.dat upx behavioral1/files/0x000c000000012241-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe 2232 bfe98ccf1fe3f9c43af64cbf1dda9812.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2232 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe 28 PID 1152 wrote to memory of 2232 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe 28 PID 1152 wrote to memory of 2232 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe 28 PID 1152 wrote to memory of 2232 1152 bfe98ccf1fe3f9c43af64cbf1dda9812.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe98ccf1fe3f9c43af64cbf1dda9812.exe"C:\Users\Admin\AppData\Local\Temp\bfe98ccf1fe3f9c43af64cbf1dda9812.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\bfe98ccf1fe3f9c43af64cbf1dda9812.exeC:\Users\Admin\AppData\Local\Temp\bfe98ccf1fe3f9c43af64cbf1dda9812.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD51b309e614207f773109217dfa51ed93f
SHA19fb0a05e6703bedbb2edbcdabef858bda21268b3
SHA256d2a64c7f49966156b019d812464fa8c50021d59d0d0c2e87ba98dc39476db16b
SHA51261df7945da610809669e4a6b561a06c9b1cec556ace1041754c011dea1065703927f487ce52ab50012e539bdf225e27a5d3b766a577073e318a386fd02e17d41
-
Filesize
521KB
MD50a0901e8017d95d04c7f6b4e02797eaa
SHA110364adee5771b732864061120f9ad226db4bd0e
SHA256e72a0e63e6bf83de2a829f70b737070a527ae4a291de4df119c38b501250c5b7
SHA5122987107595f5e23441452d37cc536443f9091e8bb27d23f33075829ae07265a27fc779cb0d6ac2f5568d289395ca1b393a5f153468d6496514fc42f86fa87df3