Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:40
Behavioral task
behavioral1
Sample
0ecc4684d06cba8167f8b63e185fc92c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ecc4684d06cba8167f8b63e185fc92c.exe
Resource
win10v2004-20231215-en
General
-
Target
0ecc4684d06cba8167f8b63e185fc92c.exe
-
Size
2.7MB
-
MD5
0ecc4684d06cba8167f8b63e185fc92c
-
SHA1
ce5ac1b45aaba4c49fffb5b5a7c2dce1966b9ebb
-
SHA256
3c348c71da70994be75c0b316b96fc03f3598acc504ee7235b25b40783ca6530
-
SHA512
417c736dd751a9b4a57edc3093115a6fab2c2512d3235da32d6a74271633607a05236c7873ca35d066ca0bd55a03d2e735dd6d45f2894fe3671c47b2724ab8e2
-
SSDEEP
49152:VHIWFr6jfw4TyxSddPIWcAqACt2R9aGagn/xNaI/8xSIrsRdev1xqyCWjR9j:VHvAjfwX0PH/y2Hahg/xNalSIRsWjHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 0ecc4684d06cba8167f8b63e185fc92c.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 0ecc4684d06cba8167f8b63e185fc92c.exe -
Loads dropped DLL 1 IoCs
pid Process 812 0ecc4684d06cba8167f8b63e185fc92c.exe -
resource yara_rule behavioral1/memory/812-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000a000000012243-10.dat upx behavioral1/files/0x000a000000012243-12.dat upx behavioral1/files/0x000a000000012243-13.dat upx behavioral1/memory/2652-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 812 0ecc4684d06cba8167f8b63e185fc92c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 812 0ecc4684d06cba8167f8b63e185fc92c.exe 2652 0ecc4684d06cba8167f8b63e185fc92c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 2652 812 0ecc4684d06cba8167f8b63e185fc92c.exe 28 PID 812 wrote to memory of 2652 812 0ecc4684d06cba8167f8b63e185fc92c.exe 28 PID 812 wrote to memory of 2652 812 0ecc4684d06cba8167f8b63e185fc92c.exe 28 PID 812 wrote to memory of 2652 812 0ecc4684d06cba8167f8b63e185fc92c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ecc4684d06cba8167f8b63e185fc92c.exe"C:\Users\Admin\AppData\Local\Temp\0ecc4684d06cba8167f8b63e185fc92c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\0ecc4684d06cba8167f8b63e185fc92c.exeC:\Users\Admin\AppData\Local\Temp\0ecc4684d06cba8167f8b63e185fc92c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD52f9d6a5d09ed539371ea1f4610f94835
SHA161a27d15ef742f44d3a2c68994ce12433b2639c7
SHA256a6c245a93a651a91b2b3a706d423bcf667ca81a2378bf8ed4ccd7abe72cf4b8a
SHA5122e12427001512e5f93daef6b6540ea5555d68e8435efc0109f6ba18fd12dbc60cc6de5d19b7ec39b22897dad503992bdbeac3f5da7d9253f70bf55cf081bd0d1
-
Filesize
1.5MB
MD5847ef33943d5725ef43e6f32691d8699
SHA1374ad5e8c4f14bcba947aaa88291e31b364e47a9
SHA2566b17babbffdac4c02e83df94c1c3fcea0f3ad7b73eb8f795889d237df5b24a3d
SHA512e8d3ab2bd1c694a878c2f317b2e3bf7ee4eeb11ea890771b03efc561cb4c07fe20d7f95cde7ea0a72017a45c6eab4112bf5e366e0ca20fd494277a8419fe45a9
-
Filesize
896KB
MD50c6abe2949c688411f3afd7080e9845f
SHA1b66c7f92ab1744c8345b4673885a48c57677bd4b
SHA256024db5df69078edd7cd8632334a5a01762ecfe5719e6f7ea01ada363989ca085
SHA512c433eea1e3af7a20145183c9fac26d58ae19d667a2a8844cfc2ed45fa8f11f9a55761f4bbefd96328a7a276aab90322d22e0ac44bde818f4742755bb1fbdf985