Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 15:26
Behavioral task
behavioral1
Sample
9c06f79b249f01e5333f2b7327502e3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9c06f79b249f01e5333f2b7327502e3e.exe
Resource
win10v2004-20231215-en
General
-
Target
9c06f79b249f01e5333f2b7327502e3e.exe
-
Size
1.3MB
-
MD5
9c06f79b249f01e5333f2b7327502e3e
-
SHA1
b3816189467add3db446fbf4b4e07233c73a5b51
-
SHA256
5064d5d54a6b94946b036e7c27c8fcfe053861a365cddbd61de5387d172aab81
-
SHA512
0194267787b1591e9146017dde71a1ea139c069cea22b98681b5078ccf6df6608d3b004df7cf07e8f10ce0d1073463b2ce8df27cf5ed8779a79b8dccbfbaaf88
-
SSDEEP
24576:mKp9+rigb4uiq0zRPsHRTOXuUJXY9YnQgscUgGoGmR7WvG:nPTgb45q0FPsxqLY9YQz0lr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1844 9c06f79b249f01e5333f2b7327502e3e.exe -
Executes dropped EXE 1 IoCs
pid Process 1844 9c06f79b249f01e5333f2b7327502e3e.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 9c06f79b249f01e5333f2b7327502e3e.exe -
resource yara_rule behavioral1/memory/2264-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x000d0000000122a8-11.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2264 9c06f79b249f01e5333f2b7327502e3e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2264 9c06f79b249f01e5333f2b7327502e3e.exe 1844 9c06f79b249f01e5333f2b7327502e3e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1844 2264 9c06f79b249f01e5333f2b7327502e3e.exe 28 PID 2264 wrote to memory of 1844 2264 9c06f79b249f01e5333f2b7327502e3e.exe 28 PID 2264 wrote to memory of 1844 2264 9c06f79b249f01e5333f2b7327502e3e.exe 28 PID 2264 wrote to memory of 1844 2264 9c06f79b249f01e5333f2b7327502e3e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe"C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exeC:\Users\Admin\AppData\Local\Temp\9c06f79b249f01e5333f2b7327502e3e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5408f9938efcc2c206e7c6512ea1a017c
SHA14566e90bf2c64c633f7e4ec45567e94c46bbb08a
SHA256de97638511bd884591068cf322a406e15b81902d3755a8a16f725d548b50f6d7
SHA51214eb8024ef93c9b965b6f042da72d7d745e441ddffedf338037091ff82d75d136a59d3085db1301122425ce94271a2d6ab2536457f4289bf804e5c1e3ac3b8d3