Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 11:05
Behavioral task
behavioral1
Sample
df030e0a13ed757fba1466a26f1ddb74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df030e0a13ed757fba1466a26f1ddb74.exe
Resource
win10v2004-20240226-en
General
-
Target
df030e0a13ed757fba1466a26f1ddb74.exe
-
Size
1.5MB
-
MD5
df030e0a13ed757fba1466a26f1ddb74
-
SHA1
d42eabac3f7090f5306636291c2a7ad1abf07cf3
-
SHA256
1320832efe50a9460ca535fa8f490194000140a8cde567d2e8f20125a560146e
-
SHA512
4eb5bf179bb5b0e646f361333dedd72e75166328303b39f945dea98ef9cb473e81188d15bffdefbfc8dc5e06488f702ba17fc7f92ef95c416671d8e767749b87
-
SSDEEP
24576:HIGb7ulgWb0OKXW6RJWxeIL13WXI1ib6cD0uosK8nYO2Cru6awqSdjU1YAW:HHb7o9hf6RJWxxF1ib6sbKiu6awxdj2n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2512 df030e0a13ed757fba1466a26f1ddb74.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 df030e0a13ed757fba1466a26f1ddb74.exe -
Loads dropped DLL 1 IoCs
pid Process 1692 df030e0a13ed757fba1466a26f1ddb74.exe -
resource yara_rule behavioral1/memory/1692-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012254-10.dat upx behavioral1/memory/2512-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1692 df030e0a13ed757fba1466a26f1ddb74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1692 df030e0a13ed757fba1466a26f1ddb74.exe 2512 df030e0a13ed757fba1466a26f1ddb74.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2512 1692 df030e0a13ed757fba1466a26f1ddb74.exe 28 PID 1692 wrote to memory of 2512 1692 df030e0a13ed757fba1466a26f1ddb74.exe 28 PID 1692 wrote to memory of 2512 1692 df030e0a13ed757fba1466a26f1ddb74.exe 28 PID 1692 wrote to memory of 2512 1692 df030e0a13ed757fba1466a26f1ddb74.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe"C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exeC:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55c48c4428d509224ec18428eab009888
SHA125b04a9f4084add804151a3490395f1351fbd7bd
SHA256f0b12425e7e11f9ff52b52dd01f9628bba03208942a44b84b01018aa8c5dbd04
SHA512baeaabcc1ee87be7c2298cd2be9f6b0dd6cc97dc0c02841fd1b26868cc2958b47b61b8cbf7abdf9df41de6c622b9825f17cd2a1e1ef30bb96d70325eb26379c8