Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:51
Behavioral task
behavioral1
Sample
cd56814b308d5a9c89ae412c52d7e1e9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cd56814b308d5a9c89ae412c52d7e1e9.exe
Resource
win10v2004-20231215-en
General
-
Target
cd56814b308d5a9c89ae412c52d7e1e9.exe
-
Size
2.7MB
-
MD5
cd56814b308d5a9c89ae412c52d7e1e9
-
SHA1
fac28dbd0e898302108fbeab4a0450b4e61d52c2
-
SHA256
a3420250efb10458fb210270e5b0206fd5a4fe4114136cbadde084d4ef69da89
-
SHA512
12ffa1aea263a2af5437da511c332937ddc548598c00e0f33d9893f60748a5103fbeca59ca54e9548c767c0cd61588dda2a6022e8b87e5a0eea77fb4a6d023cc
-
SSDEEP
49152:vw8HYuMxbUzWIDSixIFH1KPsVXw7Zn2qGlVth/VhfNlqcZ1BcTUnOf:9HYRbUzWI+iKgKfNh/VhfT7HnOf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 cd56814b308d5a9c89ae412c52d7e1e9.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 cd56814b308d5a9c89ae412c52d7e1e9.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe -
resource yara_rule behavioral1/memory/2040-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000013a1a-10.dat upx behavioral1/files/0x000a000000013a1a-15.dat upx behavioral1/memory/2040-14-0x0000000003890000-0x0000000003D7F000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe 3024 cd56814b308d5a9c89ae412c52d7e1e9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3024 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe 28 PID 2040 wrote to memory of 3024 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe 28 PID 2040 wrote to memory of 3024 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe 28 PID 2040 wrote to memory of 3024 2040 cd56814b308d5a9c89ae412c52d7e1e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd56814b308d5a9c89ae412c52d7e1e9.exe"C:\Users\Admin\AppData\Local\Temp\cd56814b308d5a9c89ae412c52d7e1e9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\cd56814b308d5a9c89ae412c52d7e1e9.exeC:\Users\Admin\AppData\Local\Temp\cd56814b308d5a9c89ae412c52d7e1e9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5870d4c268e18e5941b91a34a1e5cdfac
SHA18713565014dccb19e6d907b2148ef0fbf6ab8736
SHA256e3b37442a599d5d4668d99ad1694811d998486d4caef2d9d1e62c8de6a460c73
SHA5129834ad67548ddcca67556a96767e99ea7db5d3d01405d61cad10289c79f5bc3276cf4437fc0f9931cbccb9db9fc9322b53aaf3c3149256db4bff9cf2721f97d1
-
Filesize
785KB
MD5262dd64edfe1e7df0bcf0a3b1876348b
SHA1577a8a0b06d3e89eeec18a0621e1bfe1d3d0efde
SHA25694a8206178ceddd23124e9b30c962e45c7ae9e2848df34d5af51e207a95297c6
SHA512ffd42bbe21dc33cdf84b13ea0ae307807e9ba2bbd6326fc46d4667056cd1a7c2e50c8056f6e49b66f5535582c69f38d7d79a16c370e9f283a0392a5faf49f16a