Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 18:38

General

  • Target

    9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe

  • Size

    84KB

  • MD5

    9c5c78ebb5e5bdf2fff7023d68f3a3f7

  • SHA1

    ca3b904d6135bd26726a7d6caa315da617f8bd87

  • SHA256

    5a97822bd9dd22be45ce6914b63013edb8b15b2cecc492feff040181f4c35e9c

  • SHA512

    729920a145a6d47f221d9a2d33f9d36b042d0b2b6fd4ad42d6030bbc6ca27904d5a2825032f5ebb2376ce3dc57fd62ff365076982bccac0610c155f2e0d72e5a

  • SSDEEP

    1536:z1N80zQ4MH9n7gxIOHjsNmfRwjqx2yiXn97ibA/q+2ieak9I4:z1mG1MHp4IRBqx2yambA/deakd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
    "C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
      C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe

    Filesize

    84KB

    MD5

    0906fa97fdc77f38bf28ab240a4ff7e3

    SHA1

    c3468e9f504d3c61f703e68edc1cc04828009222

    SHA256

    52106083d6888f8ab6d3acdefd986833f307b07b6ae7ef1758e1cafa8d7b155c

    SHA512

    49c3edacbf54c56963112e7a5cef5c06a8202d593283b1889bf7633560593c7522048f39e2383bfb9b4dab8472bfaeab039315143f8ec4d8fa880bd9aebbfe1d

  • memory/2112-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2112-1-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2112-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2112-15-0x0000000000210000-0x000000000023F000-memory.dmp

    Filesize

    188KB

  • memory/2112-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2268-17-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/2268-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2268-28-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB