Analysis

  • max time kernel
    119s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:23

General

  • Target

    02c5bd02cee8a22c94b2ce87a673b621.exe

  • Size

    84KB

  • MD5

    02c5bd02cee8a22c94b2ce87a673b621

  • SHA1

    293b41ea8439da1f9b46165db2804f6aadf13762

  • SHA256

    1bc54eb876e520faa4c9d87a89d1da762d11ff136e0c2bcc29580b0d13076af3

  • SHA512

    9b0d82a6e09cc79a0c2adfc793a829f6aa3ce156fc873864149a592728e3854e615592591dbacf930709a40fd2e01fc6747ce0d8adb0c8091c6f3c7f9ac5985d

  • SSDEEP

    1536:hjPl76lO35CU3hRiPrwJF/SDSr2kIdg7G2ky7Pl8aFgpUZZIINc3HIi937:Sly5T3htNzGaG2k8NFeAZwXT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe
    "C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe
      C:\Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\02c5bd02cee8a22c94b2ce87a673b621.exe

    Filesize

    84KB

    MD5

    84b580a61eb3cf10871b16449db69a30

    SHA1

    871282ae83d8adbe638301aa0eed75000d326728

    SHA256

    fae21de035d28def0d7a1367ccd256e055516e604101c000fc252afe98084ebd

    SHA512

    3e5ebd370cc7e9e0fdb1018cd7b42ae5b336b4fa171f5df39611a2be69c0638211bc3877d38a308a344d0a1994f8be15855dfc4eb6af871208c011f7c1a75223

  • memory/2716-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2716-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2716-5-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/2716-12-0x0000000000360000-0x000000000038F000-memory.dmp

    Filesize

    188KB

  • memory/2716-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2720-18-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2720-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2720-28-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB