Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 11:23
Behavioral task
behavioral1
Sample
dde4ba5f4f6eec992e7ab6c91c22cbb0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dde4ba5f4f6eec992e7ab6c91c22cbb0.exe
Resource
win10v2004-20240226-en
General
-
Target
dde4ba5f4f6eec992e7ab6c91c22cbb0.exe
-
Size
59KB
-
MD5
dde4ba5f4f6eec992e7ab6c91c22cbb0
-
SHA1
0b03fbb80c03c82525e0021dfaf1a1542ce1129f
-
SHA256
21fae7ddf956a33de20f0c95082e45526b439d6f9e05eee38ef6991b1b43dc47
-
SHA512
e2e2a7e4a72e11063a8143336b91c082cc5fd659ad532a864da7878ab1a0d4d48818bf075e509d7bc96a1ffd0d5f38e8a74b52b015a564fcaa45190c1010ad76
-
SSDEEP
1536:b2V7I4qYCjZ/s0OaN/QESh9Xlc8ExzeiED5g3K5UasKkSNVd5UHpVc:A84qYCjZE0z/2h9VNEwLWIt4S3gHjc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4740 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe -
resource yara_rule behavioral2/memory/1648-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/files/0x000400000001e980-11.dat upx behavioral2/memory/4740-13-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1648 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1648 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe 4740 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4740 1648 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe 91 PID 1648 wrote to memory of 4740 1648 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe 91 PID 1648 wrote to memory of 4740 1648 dde4ba5f4f6eec992e7ab6c91c22cbb0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dde4ba5f4f6eec992e7ab6c91c22cbb0.exe"C:\Users\Admin\AppData\Local\Temp\dde4ba5f4f6eec992e7ab6c91c22cbb0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\dde4ba5f4f6eec992e7ab6c91c22cbb0.exeC:\Users\Admin\AppData\Local\Temp\dde4ba5f4f6eec992e7ab6c91c22cbb0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD55fa5a38d984da5880e39a4561fe8b030
SHA11495b831ae19743732828668e6fa58f4c9974f87
SHA2568ca1acb991090331652c37b5f1ab538ddba5c5aecb8102974b9ae6b98ea0a042
SHA5124f940083f48b0ab127357999b05d8fb2a9aa4f7e43f7615819d97da5e830ddbe7a944ad6d6e55c6782079618b6a99178d887453af3c86f318effde6415faadf8