Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
Resource
win10v2004-20231215-en
General
-
Target
4c9a9c48847e3ac507d2b152d3e4d7b3.exe
-
Size
84KB
-
MD5
4c9a9c48847e3ac507d2b152d3e4d7b3
-
SHA1
c03e166139744ea5739c8e126f138fee3aae22d2
-
SHA256
9538c869742f744a6843b81389fec76e71d9063f7ca99692959bf3e820ff911e
-
SHA512
6ec1cbd1980897145a95f9ba9c0f5e82ea4a24dd4f33fa18fda61d9a5bb1609e87343416a3d911b73da52b2e3450f9b7ede86d22d96b8eb4795c1aa406b9ed84
-
SSDEEP
1536:DaA70xw2qIJ8vulpDq1pSCX/IUO2JtqgZc5YCKUfiZU3+rYyMrp:Gu2qKKqY9wf2JtqgGYRxrarp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1904 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Executes dropped EXE 1 IoCs
pid Process 1904 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 1904 4c9a9c48847e3ac507d2b152d3e4d7b3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1904 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 29 PID 3048 wrote to memory of 1904 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 29 PID 3048 wrote to memory of 1904 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 29 PID 3048 wrote to memory of 1904 3048 4c9a9c48847e3ac507d2b152d3e4d7b3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe"C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exeC:\Users\Admin\AppData\Local\Temp\4c9a9c48847e3ac507d2b152d3e4d7b3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1904
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5c85fd70bcdc5b82cfae8d61fedaff5bb
SHA1e210760a190699668ad32b29ba9ee635bbbb3a6c
SHA256084efd0bdcaf85391ac0961e0650bd61a619ba86e816286d060cbcd74656723f
SHA5125516d5b90d992589fd5781d276beed89b2ff94124d6834174df5135d0b51d99b569a6e1d094b2706e4ab452d5e170bae5c4913e09dc952264a12511520ea78c9