Analysis
-
max time kernel
143s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 22:52
Behavioral task
behavioral1
Sample
c4503bfb6fae42c89640f3dece3b9a25.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4503bfb6fae42c89640f3dece3b9a25.exe
Resource
win10v2004-20240226-en
General
-
Target
c4503bfb6fae42c89640f3dece3b9a25.exe
-
Size
10.7MB
-
MD5
c4503bfb6fae42c89640f3dece3b9a25
-
SHA1
f81d6d1629eff1d6e112faceaff7c177f0b61e66
-
SHA256
2d71fe4a2d669107231d5511ea6e055b842493698add11a69f2adda4a8c5f2ff
-
SHA512
a27838a76398c6f047c69ad5fce215119a0b7baf882c04bdf8cc3d4d6e8aabc944a3e8ef1f2745be9422328b9edd9c70182d89f718b480a35381f1b34c45f645
-
SSDEEP
196608:3HX39ahOQNJJDxryam7rXexryR8j/dVxryam7rXexry:3H9ahOQNA7es7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1964 c4503bfb6fae42c89640f3dece3b9a25.exe -
Executes dropped EXE 1 IoCs
pid Process 1964 c4503bfb6fae42c89640f3dece3b9a25.exe -
resource yara_rule behavioral2/memory/4816-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0008000000023248-13.dat upx behavioral2/memory/1964-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4816 c4503bfb6fae42c89640f3dece3b9a25.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4816 c4503bfb6fae42c89640f3dece3b9a25.exe 1964 c4503bfb6fae42c89640f3dece3b9a25.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1964 4816 c4503bfb6fae42c89640f3dece3b9a25.exe 98 PID 4816 wrote to memory of 1964 4816 c4503bfb6fae42c89640f3dece3b9a25.exe 98 PID 4816 wrote to memory of 1964 4816 c4503bfb6fae42c89640f3dece3b9a25.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4503bfb6fae42c89640f3dece3b9a25.exe"C:\Users\Admin\AppData\Local\Temp\c4503bfb6fae42c89640f3dece3b9a25.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\c4503bfb6fae42c89640f3dece3b9a25.exeC:\Users\Admin\AppData\Local\Temp\c4503bfb6fae42c89640f3dece3b9a25.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:4596
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD58a435e490384c69cde9218b6fb077c8c
SHA169fe759309c196b76941062311c1a5ae348d3216
SHA2566f60661314a5fb8b44e91b058e1e0ec46c6a04454e39afc299cb3e4d55567814
SHA51200f2d363f94956699f3678be17d71d431edc73edb22cde12d11d5183cd68f6ab41b42c86f25a15d2552db194da36765bc6838f744a6da1fca17b82229d825d77