Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
c6e56b3b267f4e2fce233b2dfb660f14.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6e56b3b267f4e2fce233b2dfb660f14.exe
Resource
win10v2004-20240226-en
General
-
Target
c6e56b3b267f4e2fce233b2dfb660f14.exe
-
Size
82KB
-
MD5
c6e56b3b267f4e2fce233b2dfb660f14
-
SHA1
2fe79c21290272ec3d96f76b25a4bed42d64b997
-
SHA256
80583dbeb8ea554763e610d7c651d8f80825eb45eb5a7c0a29a3ebc9c27dbefa
-
SHA512
ee86a0e9b5346df10e402611970d34951919dd23d59519928b3f9bb00d6d014398c0fabcc463db855a01ddc22a842548c89096854e2ef2a3d62de6291c3b1fce
-
SSDEEP
1536:ozfkxCElQ2OgxD7shwKbZmhzr6QuY5nP9R0Jb:oRwQ2OwxqsCQlxD0Jb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2264 c6e56b3b267f4e2fce233b2dfb660f14.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 c6e56b3b267f4e2fce233b2dfb660f14.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe 2264 c6e56b3b267f4e2fce233b2dfb660f14.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2264 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe 29 PID 1704 wrote to memory of 2264 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe 29 PID 1704 wrote to memory of 2264 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe 29 PID 1704 wrote to memory of 2264 1704 c6e56b3b267f4e2fce233b2dfb660f14.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6e56b3b267f4e2fce233b2dfb660f14.exe"C:\Users\Admin\AppData\Local\Temp\c6e56b3b267f4e2fce233b2dfb660f14.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\c6e56b3b267f4e2fce233b2dfb660f14.exeC:\Users\Admin\AppData\Local\Temp\c6e56b3b267f4e2fce233b2dfb660f14.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2264
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54a69f3772d105ddeafac5b480825ce1c
SHA10f1fd09b8719a4f7c68425574b04c5c697721dae
SHA256eadb65763888bfc12017a74ead900afe0de3462e71c18bc8eaac9e21f61e0646
SHA512b4e4955bd6d5f2657d593debdead2018bcf405c33351256d7e57b5f66d5d2b373bd9e1e024e58669fffd7ebf67cd45578ad0fe5e2903fbeb2497fe837e3127f7