Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 17:55
Behavioral task
behavioral1
Sample
dfc2d301c7e85ba5739fc5bce85956eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfc2d301c7e85ba5739fc5bce85956eb.exe
Resource
win10v2004-20240226-en
General
-
Target
dfc2d301c7e85ba5739fc5bce85956eb.exe
-
Size
1.3MB
-
MD5
dfc2d301c7e85ba5739fc5bce85956eb
-
SHA1
7a74ca87f0812b21e0f0828a0ecba46f49385763
-
SHA256
f2ba4681becdd2c666b190db01994616c54811b9f158ad955a8e1da88ff7f6d2
-
SHA512
45da025f99b67bf7b5a866793a01efc726b88cd20f46588ff7b004aad6b78c1e7f4c13aa7e278377cb289557459242153e59c711428687b0ca3ddf612bf89513
-
SSDEEP
24576:20xLFw2Aym1l9FTTIZEgIz+y6rDx6GIGhi51dbYvG:vxk1l9FTD16rEGVK1d
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4484 dfc2d301c7e85ba5739fc5bce85956eb.exe -
Executes dropped EXE 1 IoCs
pid Process 4484 dfc2d301c7e85ba5739fc5bce85956eb.exe -
resource yara_rule behavioral2/memory/4996-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000300000001e9a0-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4996 dfc2d301c7e85ba5739fc5bce85956eb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4996 dfc2d301c7e85ba5739fc5bce85956eb.exe 4484 dfc2d301c7e85ba5739fc5bce85956eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4484 4996 dfc2d301c7e85ba5739fc5bce85956eb.exe 88 PID 4996 wrote to memory of 4484 4996 dfc2d301c7e85ba5739fc5bce85956eb.exe 88 PID 4996 wrote to memory of 4484 4996 dfc2d301c7e85ba5739fc5bce85956eb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc2d301c7e85ba5739fc5bce85956eb.exe"C:\Users\Admin\AppData\Local\Temp\dfc2d301c7e85ba5739fc5bce85956eb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\dfc2d301c7e85ba5739fc5bce85956eb.exeC:\Users\Admin\AppData\Local\Temp\dfc2d301c7e85ba5739fc5bce85956eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD53fb4c7b71ba5953bb83266a0771b355e
SHA19d40d18de6d2d118a6206e28f96c60718f49a566
SHA2566e895f12380cd35e1f606c4798d0ddc72e1fa1379dcb025ed62be4cfdef173e4
SHA5127c031fdf79f387fda25fa57759d9a46eda451ceb2b9320e70e4e75aa50bb08f19cba0402240da9b2b7967bbfc64fd8eedb339cfa7f7471908e7f9eac81fd6cd0