Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
c4579c593a748d818d0ff4f297f59cb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4579c593a748d818d0ff4f297f59cb9.exe
Resource
win10v2004-20240226-en
General
-
Target
c4579c593a748d818d0ff4f297f59cb9.exe
-
Size
92KB
-
MD5
c4579c593a748d818d0ff4f297f59cb9
-
SHA1
4f885419c5d6807392ff50ee1b2de22b11bf5ee4
-
SHA256
62b05494b801a46f3178e5913388c25fac71ef470171f3d0ff76a6a50c5a2d9b
-
SHA512
2080c4b8ff04104f2897a047be3c5682d5d9b9468f2097d7c1b3700a28114e6bf5835a9abf6c958b04d1d6b1cc15ffebcee187d69eb9444ff3f3691123b85ab8
-
SSDEEP
1536:7HGbkSd4+yhT2SjZFpPzyOfms2NTd9+cc/NsMBY1ay0CuEZdjsa:7H5k4X0Ofms2p+cqNsYS50AZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1964 c4579c593a748d818d0ff4f297f59cb9.exe -
Executes dropped EXE 1 IoCs
pid Process 1964 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4852 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4852 c4579c593a748d818d0ff4f297f59cb9.exe 1964 c4579c593a748d818d0ff4f297f59cb9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1964 4852 c4579c593a748d818d0ff4f297f59cb9.exe 88 PID 4852 wrote to memory of 1964 4852 c4579c593a748d818d0ff4f297f59cb9.exe 88 PID 4852 wrote to memory of 1964 4852 c4579c593a748d818d0ff4f297f59cb9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe"C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exeC:\Users\Admin\AppData\Local\Temp\c4579c593a748d818d0ff4f297f59cb9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5a3d57eba12d4b4d21bf8689b94e4e701
SHA12bf2025c5f32eae7c1387b8fa3af062a32075d77
SHA256b15f832f555f2546f2b9f59c5e726b87fce0753757b00544f2042ef15a9fceb9
SHA512af8ab9d988fa79611ef84af0b9babaa5e37cbd3963ddff4905e30d5996b6bfda2f9a21db060232480568d824ea3d4d7169bb6c160b0354f2e046a4a41efad52a