Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 05:18
Behavioral task
behavioral1
Sample
ca940a5d36631ec3baefe8413a7f1a28.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ca940a5d36631ec3baefe8413a7f1a28.exe
Resource
win10v2004-20240226-en
General
-
Target
ca940a5d36631ec3baefe8413a7f1a28.exe
-
Size
1.3MB
-
MD5
ca940a5d36631ec3baefe8413a7f1a28
-
SHA1
850489e7d13c939069c00161ef2b1e36e51e72d7
-
SHA256
9885c62e83851c9f2151fe6fdee7056ace91caff0f7d862810993a5a46747a18
-
SHA512
a0fd9f2d6fda48a7156cf289ed686e7cb350988c9ff255ef702230e9ee1bd00d8f9c5e459a6ee37ea14b3456080a71ed14aadd0051bcd308426fddf47118018e
-
SSDEEP
24576:3W9SYAgYvNteIknIHnYr+3N9Jsjzgw5yut1y6rQv+K/dDvG:/YYvKIkIY89CfgCpMoK/d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 ca940a5d36631ec3baefe8413a7f1a28.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 ca940a5d36631ec3baefe8413a7f1a28.exe -
resource yara_rule behavioral2/memory/2496-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/2652-14-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e9a0-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 ca940a5d36631ec3baefe8413a7f1a28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 ca940a5d36631ec3baefe8413a7f1a28.exe 2652 ca940a5d36631ec3baefe8413a7f1a28.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2652 2496 ca940a5d36631ec3baefe8413a7f1a28.exe 89 PID 2496 wrote to memory of 2652 2496 ca940a5d36631ec3baefe8413a7f1a28.exe 89 PID 2496 wrote to memory of 2652 2496 ca940a5d36631ec3baefe8413a7f1a28.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca940a5d36631ec3baefe8413a7f1a28.exe"C:\Users\Admin\AppData\Local\Temp\ca940a5d36631ec3baefe8413a7f1a28.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\ca940a5d36631ec3baefe8413a7f1a28.exeC:\Users\Admin\AppData\Local\Temp\ca940a5d36631ec3baefe8413a7f1a28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55f714ebad8f082cd575041aed3e62bb4
SHA109065d9e2fdd886a64a33803da5c2c753d9e6f57
SHA256dfbacb6b3837b175785b09c96cf24933b2ca0be0c64ec392bc9aca3b473d93c7
SHA512ae2cc36bcba5b1dcdac35bea4b004a651348b6559e2d4f6f9ad91f99689818daa33fb2c00e0e6d7dc5344cb0bd1d0f34597098fe117a9cc1984689de38078cf9