Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
5c19c91b94f61edfb99cf705b73fff77.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c19c91b94f61edfb99cf705b73fff77.exe
Resource
win10v2004-20231222-en
General
-
Target
5c19c91b94f61edfb99cf705b73fff77.exe
-
Size
82KB
-
MD5
5c19c91b94f61edfb99cf705b73fff77
-
SHA1
533fe0d6e7f79454001905ad629fdd97f10f7fe3
-
SHA256
9908ce46fe70696327ed15de07a01808fe69bf703f0eb2ff35a02ddf3f60f930
-
SHA512
963a89f3b8ba9316c18f27a40d54b9c2a404509dd3bc95d6f960970a999ccc0297518272dc727a44e5822f962216597544d15af438053a330f5927285a575ba5
-
SSDEEP
1536:A9Du3T+3dao60GmKw708ery4lW+zdPTqEgWiPpbgZex0vvd4QMHPJB:A9u3Eda90GmKDtyX+zd+X6esevn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 5c19c91b94f61edfb99cf705b73fff77.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 5c19c91b94f61edfb99cf705b73fff77.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 5c19c91b94f61edfb99cf705b73fff77.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 5c19c91b94f61edfb99cf705b73fff77.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2816 5c19c91b94f61edfb99cf705b73fff77.exe 1684 5c19c91b94f61edfb99cf705b73fff77.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 1684 2816 5c19c91b94f61edfb99cf705b73fff77.exe 29 PID 2816 wrote to memory of 1684 2816 5c19c91b94f61edfb99cf705b73fff77.exe 29 PID 2816 wrote to memory of 1684 2816 5c19c91b94f61edfb99cf705b73fff77.exe 29 PID 2816 wrote to memory of 1684 2816 5c19c91b94f61edfb99cf705b73fff77.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c19c91b94f61edfb99cf705b73fff77.exe"C:\Users\Admin\AppData\Local\Temp\5c19c91b94f61edfb99cf705b73fff77.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\5c19c91b94f61edfb99cf705b73fff77.exeC:\Users\Admin\AppData\Local\Temp\5c19c91b94f61edfb99cf705b73fff77.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c1c61ea5291cab24c3eed6fa03f8f0b9
SHA1854260db9b2842d43a8297c57de75083772125cb
SHA256b064e8809bacb23e2a1c8d246b68ac0169c48727240d93eb41d4172e435131fe
SHA5121b9e52f793ae3d6ab7c68094069f0fde2785420aacdca5b25b6b65746672558681b4ede8d0ae506e7d9fe8f4177b2964020597ed3ebe5cd5be1dcbf0cd09f856