Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 05:07
Behavioral task
behavioral1
Sample
cd2f6136abf2ba057317c551ee919eb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd2f6136abf2ba057317c551ee919eb8.exe
Resource
win10v2004-20240226-en
General
-
Target
cd2f6136abf2ba057317c551ee919eb8.exe
-
Size
5.8MB
-
MD5
cd2f6136abf2ba057317c551ee919eb8
-
SHA1
7a568cdaec3454cce146433236656e860752dcaf
-
SHA256
e1c622bca17051440ca951ebdb0ee41e91f80de56ac97295b2dc5ed12d6e91bf
-
SHA512
cb1d2ec45b4dc9b058c5a1fad4e0926026901fe933fe8712915e313ac17261179b137713c626e71ff0d51fe5b837cb0dde0fc8417a30f1e705444e938c0aa3b8
-
SSDEEP
98304:m15lcSS6YNBkPQHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:mHqDVNG6auq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3112 cd2f6136abf2ba057317c551ee919eb8.exe -
Executes dropped EXE 1 IoCs
pid Process 3112 cd2f6136abf2ba057317c551ee919eb8.exe -
resource yara_rule behavioral2/memory/3964-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000800000002325d-11.dat upx behavioral2/memory/3112-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3964 cd2f6136abf2ba057317c551ee919eb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3964 cd2f6136abf2ba057317c551ee919eb8.exe 3112 cd2f6136abf2ba057317c551ee919eb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3112 3964 cd2f6136abf2ba057317c551ee919eb8.exe 95 PID 3964 wrote to memory of 3112 3964 cd2f6136abf2ba057317c551ee919eb8.exe 95 PID 3964 wrote to memory of 3112 3964 cd2f6136abf2ba057317c551ee919eb8.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2f6136abf2ba057317c551ee919eb8.exe"C:\Users\Admin\AppData\Local\Temp\cd2f6136abf2ba057317c551ee919eb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\cd2f6136abf2ba057317c551ee919eb8.exeC:\Users\Admin\AppData\Local\Temp\cd2f6136abf2ba057317c551ee919eb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2348
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD566eb59e92263f97092af77c03178334f
SHA15ddd61449adb2b2007632406e4a8d4cf3dadeadb
SHA25649d45d64f959e9e7445040b592e25c469ef239ec71e3188ecac87f4b9d078499
SHA5129102468f3691fd052aba502b00dc6f4b21dda8db03f2ea2d92a333a47bed4ee30b6c27ab81a09a8a2b64187dc732d104857399582e1e758e1df67295661a2170