Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
caf8c2ee0760aab369ee7f3ab61ccd26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caf8c2ee0760aab369ee7f3ab61ccd26.exe
Resource
win10v2004-20240226-en
General
-
Target
caf8c2ee0760aab369ee7f3ab61ccd26.exe
-
Size
82KB
-
MD5
caf8c2ee0760aab369ee7f3ab61ccd26
-
SHA1
4a9a3019a5df74f9637775dad7d341f21464240e
-
SHA256
1e645f7d8b51d3d61674686eb393206f20b4ffa93356d31fd909638389d1ea0c
-
SHA512
83a6a2cf7e8bba922a12b3e8a430e5db1e092148e4b08faba5f8055052b882c652682489acff78ef25920024dd52e44bfe6e7d08fdf6af260752806b7fc71390
-
SSDEEP
1536:YE/BsC3LLVMRPOnZdEW+WT6WGH4ar74Qdzbo2Qgro55FhrP+KkZz:xpsDRPONjT6Wc75IgrCrzkZz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Executes dropped EXE 1 IoCs
pid Process 3536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 752 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 752 caf8c2ee0760aab369ee7f3ab61ccd26.exe 3536 caf8c2ee0760aab369ee7f3ab61ccd26.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 752 wrote to memory of 3536 752 caf8c2ee0760aab369ee7f3ab61ccd26.exe 99 PID 752 wrote to memory of 3536 752 caf8c2ee0760aab369ee7f3ab61ccd26.exe 99 PID 752 wrote to memory of 3536 752 caf8c2ee0760aab369ee7f3ab61ccd26.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe"C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exeC:\Users\Admin\AppData\Local\Temp\caf8c2ee0760aab369ee7f3ab61ccd26.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:100
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5d2005303f0d8010f6b594a226f7d7f1a
SHA1822255712b06e46ba0148555b1989f23be0730ad
SHA2566d112388e7e97b152876b8c5b0ff5f0f3ff6a28f20abc3e7a3807167400947f0
SHA512c0ff2f712d1cdb3242de2aa2a7ab8afce90619088b663dc011ea57471b9e532562c8ce44b2c3296486d483924f038b90f64b600dadfa9722c9dc675636578525