Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
a9cc2524c49cc04a318cf8ba63841d0a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9cc2524c49cc04a318cf8ba63841d0a.exe
Resource
win10v2004-20240226-en
General
-
Target
a9cc2524c49cc04a318cf8ba63841d0a.exe
-
Size
82KB
-
MD5
a9cc2524c49cc04a318cf8ba63841d0a
-
SHA1
f3a4d23ba4085fe9ebce95b940c2e0188ac9fb0a
-
SHA256
76ccdbeb6e16b3f677b323a9472306ce465e3b6b27747303b0a3031b1ace338e
-
SHA512
a8a528f9b58a31084a307e6014b2d88502d526b191d29a9eaccc842d81702bcd15ba94bed9d9f9224b3d5b7442b9c97564ca52bc30756ccea05c344c68072fef
-
SSDEEP
1536:mSz0An7UVGI650RVJTCYcJ5A5cVXZE+0OiCzqXjzpV9B3igWVdX4aGPakAr1yKNc:v3mbKJ5AeXZcOiCWD3igY7kArLH8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2952 a9cc2524c49cc04a318cf8ba63841d0a.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 a9cc2524c49cc04a318cf8ba63841d0a.exe -
Loads dropped DLL 1 IoCs
pid Process 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe 2952 a9cc2524c49cc04a318cf8ba63841d0a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2952 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe 29 PID 2228 wrote to memory of 2952 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe 29 PID 2228 wrote to memory of 2952 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe 29 PID 2228 wrote to memory of 2952 2228 a9cc2524c49cc04a318cf8ba63841d0a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe"C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exeC:\Users\Admin\AppData\Local\Temp\a9cc2524c49cc04a318cf8ba63841d0a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54b7202fbf2e1fc994e48619a56f7a032
SHA1344af62b793695d9910583a8f0980a228e96b07b
SHA256facf505b534db57d5f6d5aab725e9eecc6c7dbe8cfa7bc25eebfa7f03c649355
SHA5123cb2547c1cc6bb5a9057429d86454c9f48ed6d868c2d05f4e20427444591e606bb2249ad342093e3de6f57a0afc7ea8d106b1099bcb67d7cbd53e92b4e1395e8