Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 10:48
Behavioral task
behavioral1
Sample
c5ae7599ca97537dfe223852a354c379.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c5ae7599ca97537dfe223852a354c379.exe
Resource
win10v2004-20240226-en
General
-
Target
c5ae7599ca97537dfe223852a354c379.exe
-
Size
1.3MB
-
MD5
c5ae7599ca97537dfe223852a354c379
-
SHA1
a8446f615a5deb4c3d95c2d0d257ee01497d7d29
-
SHA256
1c761bf61237097cf03888aa6f375ffa63d481a9d91b8057494c14f03329b313
-
SHA512
a4edd375f38c30068a9bc1e030f6b8e27797c0684340ed2fafbdb54aa2ad433bf190ca3d5c780b54b1293a91c73806efa288ebd416320af86aa4d485728082ba
-
SSDEEP
24576:bWjB2qtcyP+JK5DgtQJWSqU3fqYKHCVwVzsKGfMZQVrQyW3RU9/9Us:yB2qtrIK58KZq6dGbGfMZQZlWiR9j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1632 c5ae7599ca97537dfe223852a354c379.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 c5ae7599ca97537dfe223852a354c379.exe -
Loads dropped DLL 1 IoCs
pid Process 824 c5ae7599ca97537dfe223852a354c379.exe -
resource yara_rule behavioral1/memory/824-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000c0000000122f0-10.dat upx behavioral1/memory/824-14-0x00000000034C0000-0x00000000039A7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 c5ae7599ca97537dfe223852a354c379.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 824 c5ae7599ca97537dfe223852a354c379.exe 1632 c5ae7599ca97537dfe223852a354c379.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 824 wrote to memory of 1632 824 c5ae7599ca97537dfe223852a354c379.exe 28 PID 824 wrote to memory of 1632 824 c5ae7599ca97537dfe223852a354c379.exe 28 PID 824 wrote to memory of 1632 824 c5ae7599ca97537dfe223852a354c379.exe 28 PID 824 wrote to memory of 1632 824 c5ae7599ca97537dfe223852a354c379.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ae7599ca97537dfe223852a354c379.exe"C:\Users\Admin\AppData\Local\Temp\c5ae7599ca97537dfe223852a354c379.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\c5ae7599ca97537dfe223852a354c379.exeC:\Users\Admin\AppData\Local\Temp\c5ae7599ca97537dfe223852a354c379.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a581065dc71fb2783aac142be2ea59f8
SHA1f7b1c0028843f920a6b54a41ea99617941727b5c
SHA256dc607977adb216872661deea890986a6abd0a719506d4ca9603f791eede28012
SHA51287454006d11a51d567aa178e53063c9005df9298a7812e5e29df2394e64a0c80859fe183435c7945d51992846086173f50f4c2785e950e7f24cebaa6fabcb080