Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
c5108cc5dafa00b23a0d53987d2d539b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c5108cc5dafa00b23a0d53987d2d539b.exe
Resource
win10v2004-20231215-en
General
-
Target
c5108cc5dafa00b23a0d53987d2d539b.exe
-
Size
1.9MB
-
MD5
c5108cc5dafa00b23a0d53987d2d539b
-
SHA1
11ce1ec9a13d4a2a93b5c15faaa2f207e08291b7
-
SHA256
f249386db5b8bd1836d7708561fc15a94cab03f6d637c4fb25beb4b3fc1ae133
-
SHA512
5b19e887d97d98f3619c0156ef438d810f7a37f18b48d620ed9680bae768cebc16163669bd92cdfdce8ce83e1ce30b10a591af424195c9050f57e0e7f06ce2d9
-
SSDEEP
49152:Qoa1taC070d8PPHvPBzBJQxC+ukFHyTUS4z8B:Qoa1taC0nXHR4xC+ukFHvFgB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2336 7AAC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2336 7AAC.tmp -
Loads dropped DLL 1 IoCs
pid Process 2332 c5108cc5dafa00b23a0d53987d2d539b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2336 2332 c5108cc5dafa00b23a0d53987d2d539b.exe 28 PID 2332 wrote to memory of 2336 2332 c5108cc5dafa00b23a0d53987d2d539b.exe 28 PID 2332 wrote to memory of 2336 2332 c5108cc5dafa00b23a0d53987d2d539b.exe 28 PID 2332 wrote to memory of 2336 2332 c5108cc5dafa00b23a0d53987d2d539b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5108cc5dafa00b23a0d53987d2d539b.exe"C:\Users\Admin\AppData\Local\Temp\c5108cc5dafa00b23a0d53987d2d539b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\7AAC.tmp"C:\Users\Admin\AppData\Local\Temp\7AAC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c5108cc5dafa00b23a0d53987d2d539b.exe 834CFA30DCA31451FF4FDF1B396AA9E71D940C01E2E273BCAC20C07C97137C85D4227F596A95FDB3CB2714D56F40B0C909F8CD7F7285C413D688B8468E828FD52⤵
- Deletes itself
- Executes dropped EXE
PID:2336
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD52288e8714ff3eb28fa48b309079abe5c
SHA1943b688968d6a66799f59c3863e5a2d5a12ed2a6
SHA2568d7426c75ebda485046c431dd81e8c86afff6c199f4e211d620e2967b40c7e2d
SHA5129228cb6cd2989df62a5fbcd888cf9426925ba586f4502d516c4f5b94184c0959cafc6322b39b0790a0f22e42028bec2d7ff80778921fc21cdc76c4ea78f6a87d