Analysis
-
max time kernel
176s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 21:01
Static task
static1
Behavioral task
behavioral1
Sample
c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe
Resource
win10v2004-20230915-en
General
-
Target
c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe
-
Size
9.0MB
-
MD5
2065d4a8f16b94d7af38d2c5210aed48
-
SHA1
7747e2b842da79bc5f3c87c95d1d238106b3984f
-
SHA256
c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b
-
SHA512
0a64b85caa8214ae9bc97e378f52013e021855750eb1c9466bea4d6b74510a3e1d70e1c0cc6f64d443f03dc74cd4b0acab4f8b6b288afc570153ade1e752e6f7
-
SSDEEP
196608:GMxBTDU0bsupIk4BmqgU9z1rZTJ45/R688MEInD:BH00bak4BmSrJG2MEq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1888 c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe -
resource yara_rule behavioral2/memory/1888-6-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-11-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-12-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-14-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-26-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-33-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-34-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-35-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-38-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-41-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-43-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-45-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-47-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-51-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-53-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-55-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-57-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-59-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-61-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-63-0x0000000010000000-0x00000000118B6000-memory.dmp upx behavioral2/memory/1888-65-0x0000000010000000-0x00000000118B6000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1888 c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe 1888 c97ca33ec5714fe65f23c8ae726fe857681bcff28b83eb275e06a26db7324e7b.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e422f922abebba24a916d32897ba1705
SHA1611f33f74f1131f7c2d5c14bb518d6910d6dd37f
SHA2566b2dc2e413132904989a4f0af739a485c8c3c39617d406b2dd85c0fb0fa2c5c2
SHA512c97f4d505563df400893d92f8f36a2383633cc44fb02950d2c7ec12a409052977f1c32d46b2b275b0dab313b8eb09393146e61ec6228ef907148e32271e1f056
-
Filesize
1KB
MD59d6f3044bf180468e26235897a821abe
SHA1f66d3d4a9367c3194cf2815fd79f32b632f469ac
SHA256eeb607dd229a915665c8ca8a0fdbe1b51a87051f30576b834a5012d32439e4a0
SHA5125600082c7ac0d921f3418e05369a3cd1bf27dae98762cbc3f7296fd9b00c58c139424d9dbe0cff37732fc3795797740e8ed45b86c229f840b7616bd05ffa0e5e