Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
cbf758f6e5fadda8c916bef82fb7b113.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbf758f6e5fadda8c916bef82fb7b113.exe
Resource
win10v2004-20240226-en
General
-
Target
cbf758f6e5fadda8c916bef82fb7b113.exe
-
Size
82KB
-
MD5
cbf758f6e5fadda8c916bef82fb7b113
-
SHA1
c24f080519716619f184125bc70131feac9c4897
-
SHA256
2b4a3a435c571009c43ab1de850f0eefec3946bb8d82a4577a0c523058383a4f
-
SHA512
d8181f5e786bf46d1e1f3e19d4b5ca60dd2bc81f39af2eb0145b1b811be98e41adef2fd6d796635d028b6ffe145d8193ba7877989adec90cd8c52711bf8ee6ef
-
SSDEEP
1536:w1Q7I5CDgpVCl+xs5lIzvI2k2BAq+Uy4O00qU2kdzcrm1Elc197BWUEG4UCRvfQe:wDYgckgpt7n00qzmSlcHH4U4AOZh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 cbf758f6e5fadda8c916bef82fb7b113.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 cbf758f6e5fadda8c916bef82fb7b113.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4088 cbf758f6e5fadda8c916bef82fb7b113.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4088 cbf758f6e5fadda8c916bef82fb7b113.exe 2964 cbf758f6e5fadda8c916bef82fb7b113.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 2964 4088 cbf758f6e5fadda8c916bef82fb7b113.exe 91 PID 4088 wrote to memory of 2964 4088 cbf758f6e5fadda8c916bef82fb7b113.exe 91 PID 4088 wrote to memory of 2964 4088 cbf758f6e5fadda8c916bef82fb7b113.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf758f6e5fadda8c916bef82fb7b113.exe"C:\Users\Admin\AppData\Local\Temp\cbf758f6e5fadda8c916bef82fb7b113.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\cbf758f6e5fadda8c916bef82fb7b113.exeC:\Users\Admin\AppData\Local\Temp\cbf758f6e5fadda8c916bef82fb7b113.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD501a1d9638dfd26130cced8869cbddf4e
SHA11620a129114442eab230950b922c698051df4e00
SHA25694417aa635c4b5d28c1a7242b8e7c1c30ecbc788c1b4243571301e9f09ea25cd
SHA51224197fb3e0723f2b922384948f10caaa8d9e5768052ad9d298501ae2cad030fc28e6b010f912e942c1db0d3d623053fd8f3d66cb276ea39a7225d6677fc7864a