Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 03:45
Behavioral task
behavioral1
Sample
d51ef35729552955c96fcc1a1efa591f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d51ef35729552955c96fcc1a1efa591f.exe
Resource
win10v2004-20240226-en
General
-
Target
d51ef35729552955c96fcc1a1efa591f.exe
-
Size
5.3MB
-
MD5
d51ef35729552955c96fcc1a1efa591f
-
SHA1
b36a128619c3a543e62c1c3aae7dc497415ebd4f
-
SHA256
ae369dde3139173c5fd651ecd32a77cd01676c04943e5999dcc4e270b2a72c37
-
SHA512
e49aea0cf6b41ac81e8d545d0c7b933797445a643984eb3f2d2dc810a1a03bc160311850f9185da71972767b1bf761cbc257eb46416afd29c693548c1d6227c2
-
SSDEEP
98304:Kg2gQ5ADWQyY9qG8062YwmNUkaZvYL+R5DlA9qG80:KaQGxZ9qGxF5vrk9qGx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 d51ef35729552955c96fcc1a1efa591f.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 d51ef35729552955c96fcc1a1efa591f.exe -
resource yara_rule behavioral2/memory/5080-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000d000000023152-12.dat upx behavioral2/memory/2392-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5080 d51ef35729552955c96fcc1a1efa591f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5080 d51ef35729552955c96fcc1a1efa591f.exe 2392 d51ef35729552955c96fcc1a1efa591f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2392 5080 d51ef35729552955c96fcc1a1efa591f.exe 89 PID 5080 wrote to memory of 2392 5080 d51ef35729552955c96fcc1a1efa591f.exe 89 PID 5080 wrote to memory of 2392 5080 d51ef35729552955c96fcc1a1efa591f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d51ef35729552955c96fcc1a1efa591f.exe"C:\Users\Admin\AppData\Local\Temp\d51ef35729552955c96fcc1a1efa591f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\d51ef35729552955c96fcc1a1efa591f.exeC:\Users\Admin\AppData\Local\Temp\d51ef35729552955c96fcc1a1efa591f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50efd4afe57b1354888f3b4b31ccf6c80
SHA1fcb176575a3f7b9fa0b55e20ae1a3ed38e2282a2
SHA2563e31387b06d94176cf1c8e1247cb764b243a8097c09e2a9fe83f5d034b699291
SHA512093d757cec9329620c3dd357e155ede4b15790d319317c5696e5d8991331c1abf26ff678e7dcbe5501ce6a1e5954c829b7f316be2b5ca84ab1488d2d80b2f5be