Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
5c36c77632c5dbdcc928104110b097cc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c36c77632c5dbdcc928104110b097cc.exe
Resource
win10v2004-20231215-en
General
-
Target
5c36c77632c5dbdcc928104110b097cc.exe
-
Size
82KB
-
MD5
5c36c77632c5dbdcc928104110b097cc
-
SHA1
4c20606cdebfb6ef29985d957116af07ac59ca28
-
SHA256
d6a9e7e63a75e6369f89293b5256803f30a02431fb601b0016ae83b2f41a32fa
-
SHA512
d530fe934adb28aad0d82b9ffe5c0f4e9927422cf55d2b2838368d6b7872e281c67bb25cd9296f8429fc9cf94d7ebf51ebf7e1a12ae83d11017d0acf682b9ac6
-
SSDEEP
1536:QN6d6gZ4TW1QkPAnrV0hKomHMrCmG+c3egJ+Pqse8S28888DO7W5i94FPoMxKqO1:l6uTEsKt5BENnhVcvYVi3IHFY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4312 5c36c77632c5dbdcc928104110b097cc.exe -
Executes dropped EXE 1 IoCs
pid Process 4312 5c36c77632c5dbdcc928104110b097cc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4460 5c36c77632c5dbdcc928104110b097cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4460 5c36c77632c5dbdcc928104110b097cc.exe 4312 5c36c77632c5dbdcc928104110b097cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4312 4460 5c36c77632c5dbdcc928104110b097cc.exe 87 PID 4460 wrote to memory of 4312 4460 5c36c77632c5dbdcc928104110b097cc.exe 87 PID 4460 wrote to memory of 4312 4460 5c36c77632c5dbdcc928104110b097cc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe"C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exeC:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d067f892f62797e5449765501715d532
SHA152b0064f44697fd50f6fbca2c27b6be4af009abb
SHA256a59f328867957491b8753dd021d1392d1799a38918102918f8a9e95befdd53f5
SHA51220475daa77717cbd3305f4451d92d05cc7a044236dd53bbba62a8ecf49ded66cec9bceb5fc4f93d10a79c5a21b24831b04ba4fb8880e629de71f118068dc58f8