Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 18:37
Behavioral task
behavioral1
Sample
d43abf6676c3a06973957c2e2e4e3e14.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d43abf6676c3a06973957c2e2e4e3e14.exe
Resource
win10v2004-20240226-en
General
-
Target
d43abf6676c3a06973957c2e2e4e3e14.exe
-
Size
2.7MB
-
MD5
d43abf6676c3a06973957c2e2e4e3e14
-
SHA1
aa402485a3f036f21665cb5a12fd2b8896f52a35
-
SHA256
93d21bedee91db96075be2f95d64c42ad7070eb6e6967f4037b068e8ddc76202
-
SHA512
c5585b90cd5e2a9cec920197d756461916520905d3e41034cf4c1549ebe9a9596256b5d89297411622d26caefc594e4f0bba32e21cbf418580f1a3b153e1046c
-
SSDEEP
49152:s/jAkR5xJolkAjn5/dpIhGR9LA229nRNePftMjjgUfM3hvquoRv4R9j:s/LPJsj5/rIAHL96EPCvtfsJyv4Hj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3932 d43abf6676c3a06973957c2e2e4e3e14.exe -
Executes dropped EXE 1 IoCs
pid Process 3932 d43abf6676c3a06973957c2e2e4e3e14.exe -
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4744 d43abf6676c3a06973957c2e2e4e3e14.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4744 d43abf6676c3a06973957c2e2e4e3e14.exe 3932 d43abf6676c3a06973957c2e2e4e3e14.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3932 4744 d43abf6676c3a06973957c2e2e4e3e14.exe 87 PID 4744 wrote to memory of 3932 4744 d43abf6676c3a06973957c2e2e4e3e14.exe 87 PID 4744 wrote to memory of 3932 4744 d43abf6676c3a06973957c2e2e4e3e14.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d43abf6676c3a06973957c2e2e4e3e14.exe"C:\Users\Admin\AppData\Local\Temp\d43abf6676c3a06973957c2e2e4e3e14.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\d43abf6676c3a06973957c2e2e4e3e14.exeC:\Users\Admin\AppData\Local\Temp\d43abf6676c3a06973957c2e2e4e3e14.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD54df02f79f270f0627e698fe424b97ddf
SHA11585deb5e3692ac5cd15966860a0f4f3a4de166a
SHA25649348de7ba1047542fd90a16528d380a8802af4d497dbb25b2413fc83bb00de0
SHA5123f483a62d3b5bc2008450089bd456addd81bc4ae6e187daa10b0522188c0da4ea8f7ec35017e12e4b2740be2c898d75dc8fb9a52a72def4b1a37839fbe3212bc