Analysis
-
max time kernel
10s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
b0ec505ad10e7e4dd86ceb2d35693e58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b0ec505ad10e7e4dd86ceb2d35693e58.exe
Resource
win10v2004-20240226-en
General
-
Target
b0ec505ad10e7e4dd86ceb2d35693e58.exe
-
Size
30KB
-
MD5
b0ec505ad10e7e4dd86ceb2d35693e58
-
SHA1
30dbceb806db8e82e9badbbd0c0d4ae6e4ec07bb
-
SHA256
b53c749c59757ad6567c5d2bb43b296a27d5daaef09153a0f69bacd2978dd69c
-
SHA512
f0f84a028b351352df3772e49d04a0266fbcc6b3e019f54648615b508bf308f90f7afbb83e498cde632c4e9704d5ea4aced3779a79ced249d15b5cee28734d72
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn+p8Z:b/yC4GyNM01GuQMNXw2PSjU8Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2976 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe 2976 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2976 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe 28 PID 2092 wrote to memory of 2976 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe 28 PID 2092 wrote to memory of 2976 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe 28 PID 2092 wrote to memory of 2976 2092 b0ec505ad10e7e4dd86ceb2d35693e58.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ec505ad10e7e4dd86ceb2d35693e58.exe"C:\Users\Admin\AppData\Local\Temp\b0ec505ad10e7e4dd86ceb2d35693e58.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD581e22ff6ea4066c7092171f6a0d2eadd
SHA111f2330509aa9ef108b11cbf16244d9c20dee887
SHA25678cf33194d79071ec32d5e3e5ae9467eb0ab8796096449c4a6ac4e8df12d7ae7
SHA512289f1317dd96bef99e35655f0a6ee9c353ea208fc837eb17532ad2fbf4488c596bb81d3066fcbbc9043f05822b0aac1068ba0ebc355dc94bd93bd5fc6bf0c20a