Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 06:07
Behavioral task
behavioral1
Sample
c52a6f37e8510afa54037a55836a1a5e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c52a6f37e8510afa54037a55836a1a5e.exe
Resource
win10v2004-20231215-en
General
-
Target
c52a6f37e8510afa54037a55836a1a5e.exe
-
Size
2.9MB
-
MD5
c52a6f37e8510afa54037a55836a1a5e
-
SHA1
57251269872ef16ba2622be65afa8831ad9180b2
-
SHA256
718754ef3ad315893ce458500c3005dc76d1c0ce39e6ccfac2c356fb0f130065
-
SHA512
03bffe43c01043506e86c900e09ce8ce433d28ddcaf03fd6a6bad141fd3dd9ddd39b5bc4a451c4a2c7d1492869240f1ec437ae413857c4503d66b0289dc23205
-
SSDEEP
49152:zvvVARODHM4HeOCq9WPeNIw2ngWDHVXrL0SfBDyxfl/2d/f819WuQyzESAg2:j04T9WPwIw2gG1XrISfBOZ8d/f+9g5SK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3776 c52a6f37e8510afa54037a55836a1a5e.exe -
Executes dropped EXE 1 IoCs
pid Process 3776 c52a6f37e8510afa54037a55836a1a5e.exe -
resource yara_rule behavioral2/memory/3132-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0008000000023225-11.dat upx behavioral2/memory/3776-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3132 c52a6f37e8510afa54037a55836a1a5e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3132 c52a6f37e8510afa54037a55836a1a5e.exe 3776 c52a6f37e8510afa54037a55836a1a5e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3776 3132 c52a6f37e8510afa54037a55836a1a5e.exe 85 PID 3132 wrote to memory of 3776 3132 c52a6f37e8510afa54037a55836a1a5e.exe 85 PID 3132 wrote to memory of 3776 3132 c52a6f37e8510afa54037a55836a1a5e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c52a6f37e8510afa54037a55836a1a5e.exe"C:\Users\Admin\AppData\Local\Temp\c52a6f37e8510afa54037a55836a1a5e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\c52a6f37e8510afa54037a55836a1a5e.exeC:\Users\Admin\AppData\Local\Temp\c52a6f37e8510afa54037a55836a1a5e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3776
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633KB
MD5ce782063383f7b85819eab88f08b6f16
SHA178985800a2c05beab5b9c03e758a9b00a3b55477
SHA256875a689a6589267d17ae31c58ab298ab880538b239dcdc66553db65efef79c33
SHA5122140e26a138023fcf7217abfd86defad79b223f2876dfe1691bce371ddf8d5324046b8a8dcb59d9da1b1f3c43061595751d902de200ef30e7e953b37303f2df2