Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2024, 05:08

General

  • Target

    5c36c77632c5dbdcc928104110b097cc.exe

  • Size

    82KB

  • MD5

    5c36c77632c5dbdcc928104110b097cc

  • SHA1

    4c20606cdebfb6ef29985d957116af07ac59ca28

  • SHA256

    d6a9e7e63a75e6369f89293b5256803f30a02431fb601b0016ae83b2f41a32fa

  • SHA512

    d530fe934adb28aad0d82b9ffe5c0f4e9927422cf55d2b2838368d6b7872e281c67bb25cd9296f8429fc9cf94d7ebf51ebf7e1a12ae83d11017d0acf682b9ac6

  • SSDEEP

    1536:QN6d6gZ4TW1QkPAnrV0hKomHMrCmG+c3egJ+Pqse8S28888DO7W5i94FPoMxKqO1:l6uTEsKt5BENnhVcvYVi3IHFY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe
    "C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe
      C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4312

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5c36c77632c5dbdcc928104110b097cc.exe

          Filesize

          82KB

          MD5

          d067f892f62797e5449765501715d532

          SHA1

          52b0064f44697fd50f6fbca2c27b6be4af009abb

          SHA256

          a59f328867957491b8753dd021d1392d1799a38918102918f8a9e95befdd53f5

          SHA512

          20475daa77717cbd3305f4451d92d05cc7a044236dd53bbba62a8ecf49ded66cec9bceb5fc4f93d10a79c5a21b24831b04ba4fb8880e629de71f118068dc58f8

        • memory/4312-13-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4312-15-0x00000000001B0000-0x00000000001DF000-memory.dmp

          Filesize

          188KB

        • memory/4312-25-0x0000000004D90000-0x0000000004DAB000-memory.dmp

          Filesize

          108KB

        • memory/4312-20-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/4460-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4460-1-0x0000000001430000-0x000000000145F000-memory.dmp

          Filesize

          188KB

        • memory/4460-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4460-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB