Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
c3bc0e08c96023b83b0af87342b66212.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c3bc0e08c96023b83b0af87342b66212.exe
Resource
win10v2004-20240226-en
General
-
Target
c3bc0e08c96023b83b0af87342b66212.exe
-
Size
82KB
-
MD5
c3bc0e08c96023b83b0af87342b66212
-
SHA1
fc59c1893787aec86dcfd89111a5695cd7f96690
-
SHA256
e1c217ba0d2b9077ca525a531590dadeee062314fb0d8d96161ec9910e1501c8
-
SHA512
07af1ebe94a3e3edf6190cbebc7682150ae11572927500180cc0b229646d774fba671fe61428f3855c5114794a04d6d3382019a5b6330ee8a03783ecc96aada7
-
SSDEEP
1536:w6c0CYBXCfIjbfo/AV4W6txFvvaZpvgnM9zHvS2dIr/HChU5/cQYfgd71ERjMPAw:w6c0CYBXCfIgrW6txFvva7onM9jXuTiW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1504 c3bc0e08c96023b83b0af87342b66212.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 c3bc0e08c96023b83b0af87342b66212.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 c3bc0e08c96023b83b0af87342b66212.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2756 c3bc0e08c96023b83b0af87342b66212.exe 1504 c3bc0e08c96023b83b0af87342b66212.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1504 2756 c3bc0e08c96023b83b0af87342b66212.exe 88 PID 2756 wrote to memory of 1504 2756 c3bc0e08c96023b83b0af87342b66212.exe 88 PID 2756 wrote to memory of 1504 2756 c3bc0e08c96023b83b0af87342b66212.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3bc0e08c96023b83b0af87342b66212.exe"C:\Users\Admin\AppData\Local\Temp\c3bc0e08c96023b83b0af87342b66212.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\c3bc0e08c96023b83b0af87342b66212.exeC:\Users\Admin\AppData\Local\Temp\c3bc0e08c96023b83b0af87342b66212.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1504
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5654b64c49e5859c1f22dbb8de79a47e0
SHA1362dc15fbe0788fb1861d9c464b482324970cb98
SHA25698870f7ba8689be1b32fcebf15ca0208106930ef1136a10ef2d27bf4c290bb59
SHA512ec356fa133287f0b967e304c6dd236489096c6c3fd15345cb011f7034d51bedd827266723b1f6824245ff255695ee2fe2ce8adf1daa255bf645186d656a9256a