Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 11:05
Behavioral task
behavioral1
Sample
df030e0a13ed757fba1466a26f1ddb74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df030e0a13ed757fba1466a26f1ddb74.exe
Resource
win10v2004-20240226-en
General
-
Target
df030e0a13ed757fba1466a26f1ddb74.exe
-
Size
1.5MB
-
MD5
df030e0a13ed757fba1466a26f1ddb74
-
SHA1
d42eabac3f7090f5306636291c2a7ad1abf07cf3
-
SHA256
1320832efe50a9460ca535fa8f490194000140a8cde567d2e8f20125a560146e
-
SHA512
4eb5bf179bb5b0e646f361333dedd72e75166328303b39f945dea98ef9cb473e81188d15bffdefbfc8dc5e06488f702ba17fc7f92ef95c416671d8e767749b87
-
SSDEEP
24576:HIGb7ulgWb0OKXW6RJWxeIL13WXI1ib6cD0uosK8nYO2Cru6awqSdjU1YAW:HHb7o9hf6RJWxxF1ib6sbKiu6awxdj2n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2364 df030e0a13ed757fba1466a26f1ddb74.exe -
Executes dropped EXE 1 IoCs
pid Process 2364 df030e0a13ed757fba1466a26f1ddb74.exe -
resource yara_rule behavioral2/memory/2384-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023232-11.dat upx behavioral2/memory/2364-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2384 df030e0a13ed757fba1466a26f1ddb74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2384 df030e0a13ed757fba1466a26f1ddb74.exe 2364 df030e0a13ed757fba1466a26f1ddb74.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2364 2384 df030e0a13ed757fba1466a26f1ddb74.exe 89 PID 2384 wrote to memory of 2364 2384 df030e0a13ed757fba1466a26f1ddb74.exe 89 PID 2384 wrote to memory of 2364 2384 df030e0a13ed757fba1466a26f1ddb74.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe"C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exeC:\Users\Admin\AppData\Local\Temp\df030e0a13ed757fba1466a26f1ddb74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2364
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5a65cfb90add680386b989f54d56ef700
SHA15a1cc11188cd36febb466cff94551b75a7f2c850
SHA256e26bfc660c3e9ed0adf61cc864c4601f19e7aa04eaa4b1d463b0df2d52467b63
SHA512efd0f1af5be6507cbb6f5e43dc635f71c969a932a3466e5ee8a997ca723867331fcb08e86615dc189c63f841baae9628758d56573c41be3304b01f2a2a7da07b