Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
c4579c593a748d818d0ff4f297f59cb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4579c593a748d818d0ff4f297f59cb9.exe
Resource
win10v2004-20240226-en
General
-
Target
c4579c593a748d818d0ff4f297f59cb9.exe
-
Size
92KB
-
MD5
c4579c593a748d818d0ff4f297f59cb9
-
SHA1
4f885419c5d6807392ff50ee1b2de22b11bf5ee4
-
SHA256
62b05494b801a46f3178e5913388c25fac71ef470171f3d0ff76a6a50c5a2d9b
-
SHA512
2080c4b8ff04104f2897a047be3c5682d5d9b9468f2097d7c1b3700a28114e6bf5835a9abf6c958b04d1d6b1cc15ffebcee187d69eb9444ff3f3691123b85ab8
-
SSDEEP
1536:7HGbkSd4+yhT2SjZFpPzyOfms2NTd9+cc/NsMBY1ay0CuEZdjsa:7H5k4X0Ofms2p+cqNsYS50AZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1196 c4579c593a748d818d0ff4f297f59cb9.exe -
Executes dropped EXE 1 IoCs
pid Process 1196 c4579c593a748d818d0ff4f297f59cb9.exe -
Loads dropped DLL 1 IoCs
pid Process 2972 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2972 c4579c593a748d818d0ff4f297f59cb9.exe 1196 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1196 2972 c4579c593a748d818d0ff4f297f59cb9.exe 29 PID 2972 wrote to memory of 1196 2972 c4579c593a748d818d0ff4f297f59cb9.exe 29 PID 2972 wrote to memory of 1196 2972 c4579c593a748d818d0ff4f297f59cb9.exe 29 PID 2972 wrote to memory of 1196 2972 c4579c593a748d818d0ff4f297f59cb9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe"C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exeC:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1196
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5794b22d48c3245b19721cfd3fe995204
SHA1cbbcb4c2271ca63ca5a9779640ac5a41bcbd8b1b
SHA256fa9de58b7b844171a8752229a31e87c35397d0e3af469422f69ea633a53d797f
SHA51212e699a2117312a5ed1b30b4ae2a7abb4f991ee393a2d0d056146edc4454100c01fa80bd50400301167abe741ec9b2d834f45e079ae11ea2a08def2943285e49