Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 13:05
Behavioral task
behavioral1
Sample
e1bd141dc7d48128d27f10ff1b27f5b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1bd141dc7d48128d27f10ff1b27f5b3.exe
Resource
win10v2004-20231215-en
General
-
Target
e1bd141dc7d48128d27f10ff1b27f5b3.exe
-
Size
2.9MB
-
MD5
e1bd141dc7d48128d27f10ff1b27f5b3
-
SHA1
1b90835a7f3a1a3f05d7bb84c287eb31650b7b33
-
SHA256
1fe8ea82da779acd9a142c238d4624b444176e1ce54fbd5689c47406357dbd78
-
SHA512
f92fac630c39df3e6e309e397291e55b10410b751e9c0740b3f2ae31ad2be6128d825fe8138dca77136042f5fb87af2a73686cfe5ea4409e3919eb8d8a5eb6e2
-
SSDEEP
49152:Y4hBPcz45QXs1iJ+S/SjiMOmN74NH5HUyNRcUsCVOzetdZJ:DBcVs1s+S/Sjpb4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b00000001224c-10.dat upx behavioral1/files/0x000b00000001224c-13.dat upx behavioral1/files/0x000b00000001224c-12.dat upx behavioral1/memory/3012-15-0x00000000038F0000-0x0000000003DDF000-memory.dmp upx behavioral1/memory/2992-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe 2992 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2992 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe 28 PID 3012 wrote to memory of 2992 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe 28 PID 3012 wrote to memory of 2992 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe 28 PID 3012 wrote to memory of 2992 3012 e1bd141dc7d48128d27f10ff1b27f5b3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe"C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exeC:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818KB
MD53600c415e6dbee468688bc05e926918c
SHA18b5f7b09382d3380edc2dc2a99b48d15fc113f3a
SHA256dbc0b0890ba486afd4b477665b03486491d490a791065e8521032c55e1eabe30
SHA512721b420bee40ebd03c7843536a593915bd1d80fc5fe33df586e242310d4c2ac22ee2aeb2a183065ba9409cc44831a0dcb54e167905a52e2698350833a0cac128
-
Filesize
294KB
MD520c1d463bb6d01fd0988e65ff39ee4d4
SHA18714a4ad5041d03f8dc89d196475a703068d8a8e
SHA2565621e358d6e7d86b6b33dc4631e73aff114200c7cf3d3f9b84a477def1cba466
SHA5124b22506dfa6e25c9b8753f629bbeb6c0d3478f9eceda1f46a4898124aee11fd0a4aff4d7006f9d6a847f570a56a7b0b7dc1982792723103acb2649572748c8bf
-
Filesize
561KB
MD54b7eeb9cd3394a29b1f2a4ff4d41d77f
SHA169c67d475cfb65c224535c31a362db685a6add98
SHA256515247973ca9da4419bd3c0b4bdebe2b2138407656c69ad974c2a1ac271f593d
SHA512079b5c5dc91e03077916b3e428c91d4d0cd1c8b26a8273267ff7d4db51089cdb6a0e79fb234f8877e08648c63edee84f65bf61f2589b1cc3b7e86b0158f190a4