Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
c535adc197507431213cad54fe60fa64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c535adc197507431213cad54fe60fa64.exe
Resource
win10v2004-20231215-en
General
-
Target
c535adc197507431213cad54fe60fa64.exe
-
Size
82KB
-
MD5
c535adc197507431213cad54fe60fa64
-
SHA1
b8bb39a62e924ad95a0c04df42d9c49580409a83
-
SHA256
d19fe1c918f093d4fcbd04d364ba1f5f73e8d659940e08c6c9825650513ca9b9
-
SHA512
912d547fbd914a1935f32716fb8755cc37a98c126c571cadfaf29081f231be0c31fc0f542c586e71c561dfbe1afb9985b9f238c7141cbbb6f7d5623b83cd7090
-
SSDEEP
1536:oThbuRkKAmJV8AqQ73x2uwNJd77Mnv2YOTWIzPt/MBle0myEI0NEoGHMcLHv:oThbskKAOV8AqQpwNJd77Mnv2tElVPE6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 c535adc197507431213cad54fe60fa64.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 c535adc197507431213cad54fe60fa64.exe -
Loads dropped DLL 1 IoCs
pid Process 2112 c535adc197507431213cad54fe60fa64.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2112 c535adc197507431213cad54fe60fa64.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2112 c535adc197507431213cad54fe60fa64.exe 2644 c535adc197507431213cad54fe60fa64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2644 2112 c535adc197507431213cad54fe60fa64.exe 29 PID 2112 wrote to memory of 2644 2112 c535adc197507431213cad54fe60fa64.exe 29 PID 2112 wrote to memory of 2644 2112 c535adc197507431213cad54fe60fa64.exe 29 PID 2112 wrote to memory of 2644 2112 c535adc197507431213cad54fe60fa64.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c535adc197507431213cad54fe60fa64.exe"C:\Users\Admin\AppData\Local\Temp\c535adc197507431213cad54fe60fa64.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\c535adc197507431213cad54fe60fa64.exeC:\Users\Admin\AppData\Local\Temp\c535adc197507431213cad54fe60fa64.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD55f5853e32ed407f5b7d20d11277baed9
SHA1496eef218a64c25d010ccdf112573802dddd7c28
SHA256c68270f140ab870b05ccefb9b7b00efc01e3cfa50504bb43e272a289ac2c3926
SHA512863181397affa47795a8bcbef5f6561280f52a259a5e51c1e85cc2fe632f784da778383029a6b9f67ebfdb509cd449905473229afb25dab3062c34a0fdf17cdb