Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
c2e391d6ac0f9d5506e77d833e933480.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2e391d6ac0f9d5506e77d833e933480.exe
Resource
win10v2004-20240226-en
General
-
Target
c2e391d6ac0f9d5506e77d833e933480.exe
-
Size
298KB
-
MD5
c2e391d6ac0f9d5506e77d833e933480
-
SHA1
3c3bc22bed4616ce5c43d028d66eaa7a2af1ed1c
-
SHA256
58c4bd60911ae51b0c5fbd448c341588574b59842d353dff00ac8c11db11e8ab
-
SHA512
880fea1923a4d5eccf674599832c6e82473eda1be726e2274cd51f0f2c34cf14297e0f4a65098efd32eb718d74fad124a60f42ba5a7dacb192c2f710511ee549
-
SSDEEP
6144:RtV2ZBm7BGLEN8X4SIiKmQhofLy2V40saiigCW:R6ZBsXNzdqPVQ5zCW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 c2e391d6ac0f9d5506e77d833e933480.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 c2e391d6ac0f9d5506e77d833e933480.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 c2e391d6ac0f9d5506e77d833e933480.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2516 c2e391d6ac0f9d5506e77d833e933480.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2020 c2e391d6ac0f9d5506e77d833e933480.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2020 2516 c2e391d6ac0f9d5506e77d833e933480.exe 29 PID 2516 wrote to memory of 2020 2516 c2e391d6ac0f9d5506e77d833e933480.exe 29 PID 2516 wrote to memory of 2020 2516 c2e391d6ac0f9d5506e77d833e933480.exe 29 PID 2516 wrote to memory of 2020 2516 c2e391d6ac0f9d5506e77d833e933480.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2e391d6ac0f9d5506e77d833e933480.exe"C:\Users\Admin\AppData\Local\Temp\c2e391d6ac0f9d5506e77d833e933480.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\c2e391d6ac0f9d5506e77d833e933480.exeC:\Users\Admin\AppData\Local\Temp\c2e391d6ac0f9d5506e77d833e933480.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD57d407276216b0b10d6bcf11d45971cba
SHA17a1ef73a6fbf950886398bb51da5587b2dc15dab
SHA2564794353fd9a08c696ae7216292a4c54ce02ed33672c9fe52a08eac6ab4bd5134
SHA512c6634a9d84b4e1ba8044afbe05d9d75da6e544f4b851c49548adbc9a8f4ca8ff3bb45b33e80e35e83b31509507e198001fae34fc335e1180f46f02070732ec2a