Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 22:02

General

  • Target

    4c8fe7b539bcb72ef1e397a79f1821d3.exe

  • Size

    105KB

  • MD5

    4c8fe7b539bcb72ef1e397a79f1821d3

  • SHA1

    09de319c1d49482cbf9e3bfda4e607d3af7def3d

  • SHA256

    0be4bba95cf820582a97a9b354811a7a66b534a80a6d8295cd37646827336756

  • SHA512

    ac20ef7d9d24dedac82c81ca92e19fbfba73964b3d0dc21b54df9596cb44ae1443ba1db67f99378d5b587b4954dc71378eb812d9f86785b65fc04338f4703d5e

  • SSDEEP

    3072:z5xJ5sydtOQQ5g7xfEF6Uje/CbCvHz5LS74iE/cqopW9i:zJ5s8ti5gdEUUCamvl+4MY4

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c8fe7b539bcb72ef1e397a79f1821d3.exe
    "C:\Users\Admin\AppData\Local\Temp\4c8fe7b539bcb72ef1e397a79f1821d3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\4c8fe7b539bcb72ef1e397a79f1821d3.exe
      C:\Users\Admin\AppData\Local\Temp\4c8fe7b539bcb72ef1e397a79f1821d3.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\4c8fe7b539bcb72ef1e397a79f1821d3.exe

          Filesize

          105KB

          MD5

          270c5edbbe1f84ab3d8754bf9789708c

          SHA1

          ed7054446d099615717cfa3fd268ba5fe39ca300

          SHA256

          f45b2b13dec68812d78efd4a170e5696965c2aa551675e65777f8af5df00bf2d

          SHA512

          0051e8bed2bd3e1bc44bfed26bb5cd1b997b674e125fe966632dec6a923d56b32eac7d5411f000ee7fa38e4a13169712e5a4dafd72fe9d464abf5fd8ccc6e976

        • memory/1680-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1680-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1680-14-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1680-9-0x00000000000D0000-0x00000000000FF000-memory.dmp

          Filesize

          188KB

        • memory/2712-17-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2712-19-0x00000000002E0000-0x000000000030F000-memory.dmp

          Filesize

          188KB

        • memory/2712-28-0x0000000000320000-0x000000000033B000-memory.dmp

          Filesize

          108KB

        • memory/2712-23-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB