Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 03:38

General

  • Target

    7c0c66af920fc11e32b9c85ed19a3f58.exe

  • Size

    84KB

  • MD5

    7c0c66af920fc11e32b9c85ed19a3f58

  • SHA1

    e16742e4ef7dd525b87fe827c2bb36a8922df111

  • SHA256

    54869a138130c44b5424b0a17ffd42453b4875e2ecb1ce323644181a9f46c31c

  • SHA512

    45d6c4d9123e76bc2dc820b49bb8387f13bbf473f0ac5aeb83299b7bbefce03916c1056c3b394f3429d9563436166c96e8a3aa688d7f1ce9bdbd7b608c5e4e87

  • SSDEEP

    1536:FK3Xuh8EFbzk/rDnCers7Dpuu3iCaRXOHDKzQxEohMw5gXeCr1GAHNG0wrV:YuGEFE//nufou3iCa9OZxEo6+qZJGoNa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe
    "C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe
      C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe

    Filesize

    84KB

    MD5

    c48956102d7cbf99b40633e53a57a3f4

    SHA1

    94cbb00ae513c12e39b1c6a66ef1ed499c194348

    SHA256

    0b3d1747c697caf2d057ae7f1b952e58f2986d65db9198ba36d04c11b9fa6b0a

    SHA512

    e229bd04856db80c032ca089d615a389ebd74755eb921d2e14ca1df3d9926e7defc86fc505197eb2dc1b246aca1abb9e1aafdae5b8b39bdd09652c2d991e986a

  • memory/3756-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3756-1-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/3756-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3756-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4144-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4144-14-0x0000000001500000-0x000000000152F000-memory.dmp

    Filesize

    188KB

  • memory/4144-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4144-25-0x0000000004D90000-0x0000000004DAB000-memory.dmp

    Filesize

    108KB