Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
c00e5893291f13f9b5df36822fe5ece3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c00e5893291f13f9b5df36822fe5ece3.exe
Resource
win10v2004-20240226-en
General
-
Target
c00e5893291f13f9b5df36822fe5ece3.exe
-
Size
82KB
-
MD5
c00e5893291f13f9b5df36822fe5ece3
-
SHA1
e3cad660a057ce8cc4eec2aa61a6449183517251
-
SHA256
ae35564c59eab32efa957047f166f6ba8ee0ddd86fccddb50a5895f8ef686d8a
-
SHA512
11f2bb01f68108ef6344ce32b6f1d8d37fb90b5f16b1bf96076ebdb097c425c3ac165d893e6efd1d2cd43895732fd02f32406dd3271205457ab7f403b21091a5
-
SSDEEP
1536:Os0eyuu+JO81exTQ2nI6hifRgNgXH+dvZ7IcgFncpOcU89QiPL:Os0ejuVTQ2nIh6QFmOJlo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 c00e5893291f13f9b5df36822fe5ece3.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 c00e5893291f13f9b5df36822fe5ece3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5000 c00e5893291f13f9b5df36822fe5ece3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5000 c00e5893291f13f9b5df36822fe5ece3.exe 2056 c00e5893291f13f9b5df36822fe5ece3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2056 5000 c00e5893291f13f9b5df36822fe5ece3.exe 97 PID 5000 wrote to memory of 2056 5000 c00e5893291f13f9b5df36822fe5ece3.exe 97 PID 5000 wrote to memory of 2056 5000 c00e5893291f13f9b5df36822fe5ece3.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c00e5893291f13f9b5df36822fe5ece3.exe"C:\Users\Admin\AppData\Local\Temp\c00e5893291f13f9b5df36822fe5ece3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\c00e5893291f13f9b5df36822fe5ece3.exeC:\Users\Admin\AppData\Local\Temp\c00e5893291f13f9b5df36822fe5ece3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:3884
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5bc97dcccb1677e7ee8afb7d1a03f4d9b
SHA130cee71475e0a06f7a7439723d181d4a57bfc4eb
SHA2562eec2c6434eddc0edf1843e56b9208bab4612efead99c15c9ffad57e0ff52a50
SHA512b9c9099c12407737e0c579df0b46717e02f46cb4ea8e7be09f179aec0bd6cc581a7028b4eec87f3a1ef72eedc68d9b4f8236fd136a81eaaafdbd1057902c1c6a