Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
c25b249698971cb3a2792c458105e126.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c25b249698971cb3a2792c458105e126.exe
Resource
win10v2004-20240226-en
General
-
Target
c25b249698971cb3a2792c458105e126.exe
-
Size
82KB
-
MD5
c25b249698971cb3a2792c458105e126
-
SHA1
997b2f930bba06e89ff7f30100afebd481ddde02
-
SHA256
07f6bb63507293b2ea0827c5a757dbd2d20698ee1883126058351dedcb7b10ae
-
SHA512
23cea70b4b6d8b01a4d850c6deefb177658200ffc14019ec91610210dc89d30b463e27b72b51d349d93a9871490ed1f3287691891d8e71b834190a42efe9d529
-
SSDEEP
1536:/NgCoR9ty5EG9IEQMa24Mvyrx32KMsW1Sp3Ua3F2694dYHsNPEKMF3ZQjcjZ:OI5Ew4MveNMsWgp3RF269LHsNcZQ4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2972 c25b249698971cb3a2792c458105e126.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 c25b249698971cb3a2792c458105e126.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 c25b249698971cb3a2792c458105e126.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 c25b249698971cb3a2792c458105e126.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2856 c25b249698971cb3a2792c458105e126.exe 2972 c25b249698971cb3a2792c458105e126.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2972 2856 c25b249698971cb3a2792c458105e126.exe 29 PID 2856 wrote to memory of 2972 2856 c25b249698971cb3a2792c458105e126.exe 29 PID 2856 wrote to memory of 2972 2856 c25b249698971cb3a2792c458105e126.exe 29 PID 2856 wrote to memory of 2972 2856 c25b249698971cb3a2792c458105e126.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c25b249698971cb3a2792c458105e126.exe"C:\Users\Admin\AppData\Local\Temp\c25b249698971cb3a2792c458105e126.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\c25b249698971cb3a2792c458105e126.exeC:\Users\Admin\AppData\Local\Temp\c25b249698971cb3a2792c458105e126.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD57dd7653a4412b4bf46ce9e1676ec8404
SHA160c7456151141ff4f0a7ea96b87fd2819a967035
SHA256244f3df2a9b61846aa2cc0fe04e2d7d2aff67b6e8a66b33f9e37fd71a84929b5
SHA5120a7dcd8ea600208505ba9e6ad652128845f80e6837100c87bcdd0c605b1911c4840caa1b4ab98f2f41814bb063e2ad0a6f8d09f518708f59f262f34ff68ee289