Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 02:55
Behavioral task
behavioral1
Sample
c4cb5651bd06acb73271edded5c5fff7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4cb5651bd06acb73271edded5c5fff7.exe
Resource
win10v2004-20240226-en
General
-
Target
c4cb5651bd06acb73271edded5c5fff7.exe
-
Size
5.3MB
-
MD5
c4cb5651bd06acb73271edded5c5fff7
-
SHA1
8a91a7f06f09355d0129b8da81fa10b6e2fd35e6
-
SHA256
effd935e82a8cb1be6ec17b1359b835f888cc8008192cc3eba2c6dbc094c8c06
-
SHA512
de9d72f24982480cc7931340a010542a87efc6da05e775ca17854f04b5a08b9759655c96e7c181fb4e05d123beebcb16ef3761dd6e500adb848404b3d36aac58
-
SSDEEP
98304:Dy47VBecmFc5+81w8W5E4QfFUEVxeFBLa5+81w8W5p:Dy47Vnmv8PfFrsBLL8w
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3524 c4cb5651bd06acb73271edded5c5fff7.exe -
Executes dropped EXE 1 IoCs
pid Process 3524 c4cb5651bd06acb73271edded5c5fff7.exe -
resource yara_rule behavioral2/memory/1016-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000200000001f656-11.dat upx behavioral2/memory/3524-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1016 c4cb5651bd06acb73271edded5c5fff7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1016 c4cb5651bd06acb73271edded5c5fff7.exe 3524 c4cb5651bd06acb73271edded5c5fff7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 3524 1016 c4cb5651bd06acb73271edded5c5fff7.exe 88 PID 1016 wrote to memory of 3524 1016 c4cb5651bd06acb73271edded5c5fff7.exe 88 PID 1016 wrote to memory of 3524 1016 c4cb5651bd06acb73271edded5c5fff7.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4cb5651bd06acb73271edded5c5fff7.exe"C:\Users\Admin\AppData\Local\Temp\c4cb5651bd06acb73271edded5c5fff7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\c4cb5651bd06acb73271edded5c5fff7.exeC:\Users\Admin\AppData\Local\Temp\c4cb5651bd06acb73271edded5c5fff7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3524
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5e80fe6a66aae72bd8f9403c74a1a5708
SHA1111c97c558bd1ce515224c11bb574fb0e194cf09
SHA256f610a5039c79f8624e39308ba8120a890d1127446de18a6d133bd339ee804842
SHA512528c62409ab6f9f3eb98591a33458bc484be161730d43e208100979f0bd67e388ab602e4886dc193ff8b5481a9d3e0ab85dcb97a9aa1767704f01fc65ad0148f