Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 12:53
Behavioral task
behavioral1
Sample
cb75d04c89a2c388477e5d301db132a0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cb75d04c89a2c388477e5d301db132a0.exe
Resource
win10v2004-20240226-en
General
-
Target
cb75d04c89a2c388477e5d301db132a0.exe
-
Size
2.7MB
-
MD5
cb75d04c89a2c388477e5d301db132a0
-
SHA1
972f6d72178f4f146d417b8519b01d739798c83c
-
SHA256
d359f833addf2e58944e20866e6f3c9da4c2cb53c050604e2c21e8877818862f
-
SHA512
4496dabeb8001a826c8bc5cbb9d13166044bd720f15b74b11337438444e48f102d2c1caa88424fef29b498fa11804427b95d6148cb1ff7e61727d4e575e896b0
-
SSDEEP
49152:pBPwDOF9h8qoA4A7qXvq4qdqZqw432ElLJuXaHwIb24Lod6PAPU8w8QWxsuaOp:ptqIRL2XvtkqbtXySNOAtfza3Op
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1072 cb75d04c89a2c388477e5d301db132a0.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 cb75d04c89a2c388477e5d301db132a0.exe -
resource yara_rule behavioral2/memory/1592-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx behavioral2/memory/1072-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1592 cb75d04c89a2c388477e5d301db132a0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1592 cb75d04c89a2c388477e5d301db132a0.exe 1072 cb75d04c89a2c388477e5d301db132a0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1072 1592 cb75d04c89a2c388477e5d301db132a0.exe 89 PID 1592 wrote to memory of 1072 1592 cb75d04c89a2c388477e5d301db132a0.exe 89 PID 1592 wrote to memory of 1072 1592 cb75d04c89a2c388477e5d301db132a0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb75d04c89a2c388477e5d301db132a0.exe"C:\Users\Admin\AppData\Local\Temp\cb75d04c89a2c388477e5d301db132a0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\cb75d04c89a2c388477e5d301db132a0.exeC:\Users\Admin\AppData\Local\Temp\cb75d04c89a2c388477e5d301db132a0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a776b1bffcc75b55ee6f821922cc8b30
SHA10ef6a74ef8505f9bea179ad519fd5e144c10b54a
SHA256584d17beb69618f21e5cdb63a3727f5629e0ce97d85fdd92111a59bced33d02c
SHA512c9ab5a4503c6ddb44fff7bcef410fbde845a641c72776c2695c0832671d30dc053144917c43751211be2f1aef3153fbabf33d4683a66405c20ccd11e89de8059