Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 02:46
Behavioral task
behavioral1
Sample
c4c6fce033fe0bb8f6be48bd5edafaa7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4c6fce033fe0bb8f6be48bd5edafaa7.exe
Resource
win10v2004-20240226-en
General
-
Target
c4c6fce033fe0bb8f6be48bd5edafaa7.exe
-
Size
2.9MB
-
MD5
c4c6fce033fe0bb8f6be48bd5edafaa7
-
SHA1
6966ad94e9520e788dade74ff62abac7354b6e25
-
SHA256
ab437b25d0cf63f4558353626929707c845779129d7656222551ce66313f6309
-
SHA512
402a3659faa3d5f59bae678cdb2cd48b8963d2bffa1ed80779f534feefe84ad444823e124cab128505cad202aa6682eca2ca62553d9ff2d0ddada407bd4f4571
-
SSDEEP
49152:rumCPRshwXO/8TsyztaeTN74NH5HUyNRcUsCVOzetdZJ:rutZteUhtpT4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4340 c4c6fce033fe0bb8f6be48bd5edafaa7.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 c4c6fce033fe0bb8f6be48bd5edafaa7.exe -
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000001e5eb-11.dat upx behavioral2/memory/4340-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1988 c4c6fce033fe0bb8f6be48bd5edafaa7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1988 c4c6fce033fe0bb8f6be48bd5edafaa7.exe 4340 c4c6fce033fe0bb8f6be48bd5edafaa7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4340 1988 c4c6fce033fe0bb8f6be48bd5edafaa7.exe 87 PID 1988 wrote to memory of 4340 1988 c4c6fce033fe0bb8f6be48bd5edafaa7.exe 87 PID 1988 wrote to memory of 4340 1988 c4c6fce033fe0bb8f6be48bd5edafaa7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4c6fce033fe0bb8f6be48bd5edafaa7.exe"C:\Users\Admin\AppData\Local\Temp\c4c6fce033fe0bb8f6be48bd5edafaa7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\c4c6fce033fe0bb8f6be48bd5edafaa7.exeC:\Users\Admin\AppData\Local\Temp\c4c6fce033fe0bb8f6be48bd5edafaa7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD575973c850d3022f628e04702891388ba
SHA19d7d6d22d330d90d685d4a20740ef36c7a17d5d9
SHA256cfbc0c4f7ad9fdd189d697bf0119ef4f798d370f0068f0bc83c8f05319d2e990
SHA5122c18c24beea3c7ea6f05aa0bbd80b7cae33a997ed0c3dba047bb328693bc2ae51daa4ad2256f8261e7f206b0a8fedbdf1d7a22ebf4db6216fe3a1d4a3fae89b5