Analysis
-
max time kernel
10s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 20:14
Behavioral task
behavioral1
Sample
4c5b7b359c7c53a296f58b03b28d257c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c5b7b359c7c53a296f58b03b28d257c.exe
Resource
win10v2004-20231215-en
General
-
Target
4c5b7b359c7c53a296f58b03b28d257c.exe
-
Size
133KB
-
MD5
4c5b7b359c7c53a296f58b03b28d257c
-
SHA1
c1870eb60017ae29b92ef0d847c492a997f93f3c
-
SHA256
85dd86b519eea14485fd9ed45fc45297db9eba39d8c5d98a02193ae24ad646fc
-
SHA512
9274cfbc47cf014a76328cfddbbac10ff333c59158061c789247d7cf654e5b71a216467b55c128aa83e5ebbe7d13d5aadee5799172df8247a14d2ce76ba9e89f
-
SSDEEP
3072:XSrRtHZMRKoo8HhQVrFnNLBtK1Alpd6rKcrSXhYafQ:iP5MIqh2pntBJlpdGrSXhdQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1888 4c5b7b359c7c53a296f58b03b28d257c.exe -
Executes dropped EXE 1 IoCs
pid Process 1888 4c5b7b359c7c53a296f58b03b28d257c.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 4c5b7b359c7c53a296f58b03b28d257c.exe -
resource yara_rule behavioral1/files/0x000c000000013138-11.dat upx behavioral1/memory/3060-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/files/0x000c000000013138-16.dat upx behavioral1/memory/3060-15-0x0000000000340000-0x00000000003C6000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3060 4c5b7b359c7c53a296f58b03b28d257c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3060 4c5b7b359c7c53a296f58b03b28d257c.exe 1888 4c5b7b359c7c53a296f58b03b28d257c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1888 3060 4c5b7b359c7c53a296f58b03b28d257c.exe 18 PID 3060 wrote to memory of 1888 3060 4c5b7b359c7c53a296f58b03b28d257c.exe 18 PID 3060 wrote to memory of 1888 3060 4c5b7b359c7c53a296f58b03b28d257c.exe 18 PID 3060 wrote to memory of 1888 3060 4c5b7b359c7c53a296f58b03b28d257c.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c5b7b359c7c53a296f58b03b28d257c.exe"C:\Users\Admin\AppData\Local\Temp\4c5b7b359c7c53a296f58b03b28d257c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\4c5b7b359c7c53a296f58b03b28d257c.exeC:\Users\Admin\AppData\Local\Temp\4c5b7b359c7c53a296f58b03b28d257c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58ede8e863924e76ec19880a12f912f87
SHA1aa9d25999a286604e72a96492284c844b8e6b834
SHA25675f3c404cb7f4b674f01ef5914041633760cfc1997f1299743db28b19cdb9fce
SHA51225e2ca7a6a654e50846bf0909c91c7c3575230354c43f9558450c90fc0c6948a74402ced888f56d03642f18d6f1e2b0226d74160b4c631f03c18ee508c741200