Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
c52eb62ee59056c8f60b64460a0b6dea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c52eb62ee59056c8f60b64460a0b6dea.exe
Resource
win10v2004-20240226-en
General
-
Target
c52eb62ee59056c8f60b64460a0b6dea.exe
-
Size
82KB
-
MD5
c52eb62ee59056c8f60b64460a0b6dea
-
SHA1
35401464e5f8e2599380203bf30d2b8cbc1ec469
-
SHA256
396d4a00137faadcd673fd5fac094e923b7effc9f177e20d4f93bbf36c9088c2
-
SHA512
dd2e0ed06322f5eb9a40bdc900b18d154e01aacec153ae4533b3c882116b3622668983ab10cb947e519a526755fb4f3a540ece2ab5579fc6eba965a6b103cc8f
-
SSDEEP
1536:jkEYi2wgg5EvgYNSda0tSYchyDIPhTFd3ZymUlDOGYvB63FlhjaH:vYi2y5AR0tSYxziVvB6Vnjg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 832 c52eb62ee59056c8f60b64460a0b6dea.exe -
Executes dropped EXE 1 IoCs
pid Process 832 c52eb62ee59056c8f60b64460a0b6dea.exe -
Loads dropped DLL 1 IoCs
pid Process 548 c52eb62ee59056c8f60b64460a0b6dea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 548 c52eb62ee59056c8f60b64460a0b6dea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 548 c52eb62ee59056c8f60b64460a0b6dea.exe 832 c52eb62ee59056c8f60b64460a0b6dea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 548 wrote to memory of 832 548 c52eb62ee59056c8f60b64460a0b6dea.exe 29 PID 548 wrote to memory of 832 548 c52eb62ee59056c8f60b64460a0b6dea.exe 29 PID 548 wrote to memory of 832 548 c52eb62ee59056c8f60b64460a0b6dea.exe 29 PID 548 wrote to memory of 832 548 c52eb62ee59056c8f60b64460a0b6dea.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe"C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exeC:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD52f3da56a91b7f52e7a7e3e43c68b4909
SHA1aa1da8ce5db1292ddd39588515bf7c62eaafd7e1
SHA2567ba700ed6cc6ae9b2474e866f4358bba0ef9ffcc4b481f829d77dd1f2bf86426
SHA512cf2311921eba3fd346512a47215d9377f0f4602bd4f8e6af009118608558642ab1c3685910c18557a8206902ada3f96f3f495a95731d523fd3fd6bb2dfe64f34