Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe
Resource
win10v2004-20240508-en
General
-
Target
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe
-
Size
416KB
-
MD5
b0923dddb85b09333f969a8536e684c2
-
SHA1
82c0d75cfb413226c1a0a5c2d9e38ed4723e8f39
-
SHA256
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50
-
SHA512
06d58fea53a8dd9c513212d681fb074afbc99f73f83a4481720bf097fa14fd73923374cbac2937bf55af9567f87f381e4cc28e39176668790615e16bb2d3e026
-
SSDEEP
6144:1jKUkZNboWLtbUBfTi96tYa1UWdDJboY4sJ9pALL7j1aFwoF:1jKUkLbfUB7oNa1U6D9d9pAi
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2848 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Executes dropped EXE 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2848 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Loads dropped DLL 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2848 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exepid process 2848 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exedescription pid process target process PID 2884 wrote to memory of 2848 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe PID 2884 wrote to memory of 2848 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe PID 2884 wrote to memory of 2848 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe PID 2884 wrote to memory of 2848 2884 ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe"C:\Users\Admin\AppData\Local\Temp\ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exeC:\Users\Admin\AppData\Local\Temp\ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2848
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\ba2b372ecfd8c59f6d5c8d640c9709131b7c6669f6f69cfb847ba4d6b432ad50.exeFilesize
416KB
MD590b61118a769d72a6d2e00ed3b9c94ed
SHA18778aa744cd2cb453cf8c0f2c72ae139a1969103
SHA2566ede88a466a73ce9514bb1b53d6bf06104d98fda53cddfed799971e8424ef134
SHA5122798895169dae618b06a7d9c0cc5e3c6c5f99bd22c6523d7a8267e21403493e6d6dcfeda77f77b205d082939f591e17632c20efd09258925ee27ab25ccce565b
-
memory/2848-10-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/2848-11-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/2848-16-0x0000000000180000-0x00000000001B6000-memory.dmpFilesize
216KB
-
memory/2884-0-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/2884-9-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB