Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
Resource
win10v2004-20231215-en
General
-
Target
9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe
-
Size
84KB
-
MD5
9c5c78ebb5e5bdf2fff7023d68f3a3f7
-
SHA1
ca3b904d6135bd26726a7d6caa315da617f8bd87
-
SHA256
5a97822bd9dd22be45ce6914b63013edb8b15b2cecc492feff040181f4c35e9c
-
SHA512
729920a145a6d47f221d9a2d33f9d36b042d0b2b6fd4ad42d6030bbc6ca27904d5a2825032f5ebb2376ce3dc57fd62ff365076982bccac0610c155f2e0d72e5a
-
SSDEEP
1536:z1N80zQ4MH9n7gxIOHjsNmfRwjqx2yiXn97ibA/q+2ieak9I4:z1mG1MHp4IRBqx2yambA/deakd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe 2268 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2268 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe 29 PID 2112 wrote to memory of 2268 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe 29 PID 2112 wrote to memory of 2268 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe 29 PID 2112 wrote to memory of 2268 2112 9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe"C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exeC:\Users\Admin\AppData\Local\Temp\9c5c78ebb5e5bdf2fff7023d68f3a3f7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2268
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD50906fa97fdc77f38bf28ab240a4ff7e3
SHA1c3468e9f504d3c61f703e68edc1cc04828009222
SHA25652106083d6888f8ab6d3acdefd986833f307b07b6ae7ef1758e1cafa8d7b155c
SHA51249c3edacbf54c56963112e7a5cef5c06a8202d593283b1889bf7633560593c7522048f39e2383bfb9b4dab8472bfaeab039315143f8ec4d8fa880bd9aebbfe1d