Analysis
-
max time kernel
166s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 02:46
Behavioral task
behavioral1
Sample
d7b0a90bd15a07b07cf411205c5715f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7b0a90bd15a07b07cf411205c5715f3.exe
Resource
win10v2004-20240226-en
General
-
Target
d7b0a90bd15a07b07cf411205c5715f3.exe
-
Size
1.3MB
-
MD5
d7b0a90bd15a07b07cf411205c5715f3
-
SHA1
578f286d88c77ec555f261755540a81a7cc7af5e
-
SHA256
d3233b25536ba862f80b4f470e1469c743bce12fc2b4996f6ec2ae9e16924ba5
-
SHA512
72c2c953d7090c7bac5c9d860cae505ecf9a9ecf297064fa5ab989c6cc8437864bef502aa1cea35b0eb09fd8c5d5476cd476c27819341f3950cfdf32d43e5634
-
SSDEEP
24576:yq+de+IKmYiAEODcJn84lRIWe3vyQ0eLWaKFu8E+dtVonABoJyDcOgRvG:b+IKmYi2cdDXjiqQoaKnQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 d7b0a90bd15a07b07cf411205c5715f3.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 d7b0a90bd15a07b07cf411205c5715f3.exe -
resource yara_rule behavioral2/memory/4392-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x0008000000023249-12.dat upx behavioral2/memory/1720-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4392 d7b0a90bd15a07b07cf411205c5715f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4392 d7b0a90bd15a07b07cf411205c5715f3.exe 1720 d7b0a90bd15a07b07cf411205c5715f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1720 4392 d7b0a90bd15a07b07cf411205c5715f3.exe 98 PID 4392 wrote to memory of 1720 4392 d7b0a90bd15a07b07cf411205c5715f3.exe 98 PID 4392 wrote to memory of 1720 4392 d7b0a90bd15a07b07cf411205c5715f3.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b0a90bd15a07b07cf411205c5715f3.exe"C:\Users\Admin\AppData\Local\Temp\d7b0a90bd15a07b07cf411205c5715f3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\d7b0a90bd15a07b07cf411205c5715f3.exeC:\Users\Admin\AppData\Local\Temp\d7b0a90bd15a07b07cf411205c5715f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:4184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51391d73e2e1c3414f397106ec9ca8f6e
SHA168ed2013ff6b967b2b1bb0835aef355af0ec414c
SHA256c5f5619e7d47b9c650fafbaf22bd8caef63e0e841d290b68c1c8441d3c062c58
SHA5120df9a8aef5a5b6bae8a291796bb6b0c2e0cfc217326239089745893ae7d41e1d030eeb6cd1b9a1619c394d1af61429ce084daf98d679a5ee5f75f3d8cdecba7f