Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 17:59

General

  • Target

    a9cc2524c49cc04a318cf8ba63841d0a.exe

  • Size

    82KB

  • MD5

    a9cc2524c49cc04a318cf8ba63841d0a

  • SHA1

    f3a4d23ba4085fe9ebce95b940c2e0188ac9fb0a

  • SHA256

    76ccdbeb6e16b3f677b323a9472306ce465e3b6b27747303b0a3031b1ace338e

  • SHA512

    a8a528f9b58a31084a307e6014b2d88502d526b191d29a9eaccc842d81702bcd15ba94bed9d9f9224b3d5b7442b9c97564ca52bc30756ccea05c344c68072fef

  • SSDEEP

    1536:mSz0An7UVGI650RVJTCYcJ5A5cVXZE+0OiCzqXjzpV9B3igWVdX4aGPakAr1yKNc:v3mbKJ5AeXZcOiCWD3igY7kArLH8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe
    "C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe
      C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe

    Filesize

    82KB

    MD5

    4b7202fbf2e1fc994e48619a56f7a032

    SHA1

    344af62b793695d9910583a8f0980a228e96b07b

    SHA256

    facf505b534db57d5f6d5aab725e9eecc6c7dbe8cfa7bc25eebfa7f03c649355

    SHA512

    3cb2547c1cc6bb5a9057429d86454c9f48ed6d868c2d05f4e20427444591e606bb2249ad342093e3de6f57a0afc7ea8d106b1099bcb67d7cbd53e92b4e1395e8

  • memory/2228-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2228-2-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2228-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2228-12-0x0000000000190000-0x00000000001BF000-memory.dmp

    Filesize

    188KB

  • memory/2228-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2952-20-0x0000000000140000-0x000000000016F000-memory.dmp

    Filesize

    188KB

  • memory/2952-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2952-25-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB