Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
7c0c66af920fc11e32b9c85ed19a3f58.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c0c66af920fc11e32b9c85ed19a3f58.exe
Resource
win10v2004-20231215-en
General
-
Target
7c0c66af920fc11e32b9c85ed19a3f58.exe
-
Size
84KB
-
MD5
7c0c66af920fc11e32b9c85ed19a3f58
-
SHA1
e16742e4ef7dd525b87fe827c2bb36a8922df111
-
SHA256
54869a138130c44b5424b0a17ffd42453b4875e2ecb1ce323644181a9f46c31c
-
SHA512
45d6c4d9123e76bc2dc820b49bb8387f13bbf473f0ac5aeb83299b7bbefce03916c1056c3b394f3429d9563436166c96e8a3aa688d7f1ce9bdbd7b608c5e4e87
-
SSDEEP
1536:FK3Xuh8EFbzk/rDnCers7Dpuu3iCaRXOHDKzQxEohMw5gXeCr1GAHNG0wrV:YuGEFE//nufou3iCa9OZxEo6+qZJGoNa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4144 7c0c66af920fc11e32b9c85ed19a3f58.exe -
Executes dropped EXE 1 IoCs
pid Process 4144 7c0c66af920fc11e32b9c85ed19a3f58.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3756 7c0c66af920fc11e32b9c85ed19a3f58.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3756 7c0c66af920fc11e32b9c85ed19a3f58.exe 4144 7c0c66af920fc11e32b9c85ed19a3f58.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4144 3756 7c0c66af920fc11e32b9c85ed19a3f58.exe 86 PID 3756 wrote to memory of 4144 3756 7c0c66af920fc11e32b9c85ed19a3f58.exe 86 PID 3756 wrote to memory of 4144 3756 7c0c66af920fc11e32b9c85ed19a3f58.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe"C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exeC:\Users\Admin\AppData\Local\Temp\7c0c66af920fc11e32b9c85ed19a3f58.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5c48956102d7cbf99b40633e53a57a3f4
SHA194cbb00ae513c12e39b1c6a66ef1ed499c194348
SHA2560b3d1747c697caf2d057ae7f1b952e58f2986d65db9198ba36d04c11b9fa6b0a
SHA512e229bd04856db80c032ca089d615a389ebd74755eb921d2e14ca1df3d9926e7defc86fc505197eb2dc1b246aca1abb9e1aafdae5b8b39bdd09652c2d991e986a