Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 06:18

General

  • Target

    c52eb62ee59056c8f60b64460a0b6dea.exe

  • Size

    82KB

  • MD5

    c52eb62ee59056c8f60b64460a0b6dea

  • SHA1

    35401464e5f8e2599380203bf30d2b8cbc1ec469

  • SHA256

    396d4a00137faadcd673fd5fac094e923b7effc9f177e20d4f93bbf36c9088c2

  • SHA512

    dd2e0ed06322f5eb9a40bdc900b18d154e01aacec153ae4533b3c882116b3622668983ab10cb947e519a526755fb4f3a540ece2ab5579fc6eba965a6b103cc8f

  • SSDEEP

    1536:jkEYi2wgg5EvgYNSda0tSYchyDIPhTFd3ZymUlDOGYvB63FlhjaH:vYi2y5AR0tSYxziVvB6Vnjg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe
    "C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe
      C:\Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\c52eb62ee59056c8f60b64460a0b6dea.exe

    Filesize

    82KB

    MD5

    2f3da56a91b7f52e7a7e3e43c68b4909

    SHA1

    aa1da8ce5db1292ddd39588515bf7c62eaafd7e1

    SHA256

    7ba700ed6cc6ae9b2474e866f4358bba0ef9ffcc4b481f829d77dd1f2bf86426

    SHA512

    cf2311921eba3fd346512a47215d9377f0f4602bd4f8e6af009118608558642ab1c3685910c18557a8206902ada3f96f3f495a95731d523fd3fd6bb2dfe64f34

  • memory/548-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/548-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/548-1-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/548-12-0x00000000001A0000-0x00000000001CF000-memory.dmp

    Filesize

    188KB

  • memory/548-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/832-17-0x00000000002E0000-0x000000000030F000-memory.dmp

    Filesize

    188KB

  • memory/832-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/832-28-0x0000000000320000-0x000000000033B000-memory.dmp

    Filesize

    108KB