Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 13:05
Behavioral task
behavioral1
Sample
e1bd141dc7d48128d27f10ff1b27f5b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1bd141dc7d48128d27f10ff1b27f5b3.exe
Resource
win10v2004-20231215-en
General
-
Target
e1bd141dc7d48128d27f10ff1b27f5b3.exe
-
Size
2.9MB
-
MD5
e1bd141dc7d48128d27f10ff1b27f5b3
-
SHA1
1b90835a7f3a1a3f05d7bb84c287eb31650b7b33
-
SHA256
1fe8ea82da779acd9a142c238d4624b444176e1ce54fbd5689c47406357dbd78
-
SHA512
f92fac630c39df3e6e309e397291e55b10410b751e9c0740b3f2ae31ad2be6128d825fe8138dca77136042f5fb87af2a73686cfe5ea4409e3919eb8d8a5eb6e2
-
SSDEEP
49152:Y4hBPcz45QXs1iJ+S/SjiMOmN74NH5HUyNRcUsCVOzetdZJ:DBcVs1s+S/Sjpb4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4328 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
resource yara_rule behavioral2/memory/5068-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00090000000231d3-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5068 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5068 e1bd141dc7d48128d27f10ff1b27f5b3.exe 4328 e1bd141dc7d48128d27f10ff1b27f5b3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4328 5068 e1bd141dc7d48128d27f10ff1b27f5b3.exe 85 PID 5068 wrote to memory of 4328 5068 e1bd141dc7d48128d27f10ff1b27f5b3.exe 85 PID 5068 wrote to memory of 4328 5068 e1bd141dc7d48128d27f10ff1b27f5b3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe"C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exeC:\Users\Admin\AppData\Local\Temp\e1bd141dc7d48128d27f10ff1b27f5b3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD54f016879c77e8f0964e7573a8f70d89e
SHA1676fff372e6bc6cd36504d73da38008ce31a3caa
SHA25687e09d9d7c31d3dcd6ef8865fa0de112c56b95196d7f8e1bcac738271aff61c0
SHA51258702bf9609966f40c7905be6478e62fde0799c6d228a6040550a21393e08db18359a6e78ebc65c5a7354176e14dadd5847fe6cdeec575e3fdb91e2bd1c3c087