Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 23:58
Behavioral task
behavioral1
Sample
c1f03870facbf1acde044ac3e69f33fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1f03870facbf1acde044ac3e69f33fe.exe
Resource
win10v2004-20240226-en
General
-
Target
c1f03870facbf1acde044ac3e69f33fe.exe
-
Size
5.3MB
-
MD5
c1f03870facbf1acde044ac3e69f33fe
-
SHA1
2ea7c10d156fd93e4a4b75bce792af485af09c4c
-
SHA256
8567f97ee3ca46d4b93f70c7485bc6c23425ec61d7658973b95fe9776d5941a7
-
SHA512
71d963be6180b9d9431988b35837ab9082b527f3af6a322846aca4e802fc1e6fd707164bf3bb492fa8eb3026c9a8954559cd5190d2f535b3e6676dcde82c2286
-
SSDEEP
98304:+VcByr+3/HyC79lTNuAdAHktBcwQDM2YIDULHYP4xlB9v7jkuoy2HktBcwQDM2Yd:v0S3/j79lTNugAschDHIT1Fv2schDHIN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1748 c1f03870facbf1acde044ac3e69f33fe.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 c1f03870facbf1acde044ac3e69f33fe.exe -
Loads dropped DLL 1 IoCs
pid Process 1784 c1f03870facbf1acde044ac3e69f33fe.exe -
resource yara_rule behavioral1/memory/1784-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000a000000012265-10.dat upx behavioral1/files/0x000a000000012265-13.dat upx behavioral1/memory/1784-15-0x0000000003CA0000-0x0000000004187000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1784 c1f03870facbf1acde044ac3e69f33fe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1784 c1f03870facbf1acde044ac3e69f33fe.exe 1748 c1f03870facbf1acde044ac3e69f33fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1748 1784 c1f03870facbf1acde044ac3e69f33fe.exe 28 PID 1784 wrote to memory of 1748 1784 c1f03870facbf1acde044ac3e69f33fe.exe 28 PID 1784 wrote to memory of 1748 1784 c1f03870facbf1acde044ac3e69f33fe.exe 28 PID 1784 wrote to memory of 1748 1784 c1f03870facbf1acde044ac3e69f33fe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f03870facbf1acde044ac3e69f33fe.exe"C:\Users\Admin\AppData\Local\Temp\c1f03870facbf1acde044ac3e69f33fe.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\c1f03870facbf1acde044ac3e69f33fe.exeC:\Users\Admin\AppData\Local\Temp\c1f03870facbf1acde044ac3e69f33fe.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD56de681af923f78565003b2994f8dcf53
SHA1d11281ef06735210362c8af7687a908bec01e187
SHA25604c2724a4b0e841782a88ed0eec7564b9b7b669bb253f9b35cafe98d436d10dd
SHA512c497eb9a7ac81d90cc58cc4ad04b2f632c1e677478b52054780b79ebac566f0d6db34e23be4c263dfa682a942456742201713dd6265b60ab1f1544c2954d1373
-
Filesize
960KB
MD56472c293c37c3c4acd37c12acb2d54c4
SHA17bcd753cd2b25d179522a33986068c1208e6eac1
SHA25608a7e69d806044cd5bcd407fe7d82eae4459a602d533dc6d4b0cc5370063cd62
SHA51221db83a24117312ebec699dd8246afbbdeeed8b8e372e4658a19b611f76b2177060f8801ee9725eaa4ec8e27fed587bb7a262930d15392eb07303f3ffa5e1177