Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
c633f49844e3c90790dab8c7ae97866f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c633f49844e3c90790dab8c7ae97866f.exe
Resource
win10v2004-20240226-en
General
-
Target
c633f49844e3c90790dab8c7ae97866f.exe
-
Size
204KB
-
MD5
c633f49844e3c90790dab8c7ae97866f
-
SHA1
76022866b077d93d6906380f358f9f2dccaf11a2
-
SHA256
2056832e322f708fb2e0935f80685396852c13f0547ca66e17043bb8d484b6f0
-
SHA512
86699bb0231ee7d5e7811aeefda94de066f776207dbecf221eb8486ce55ec7bec5db7d4d5568b203ef754115949a69518c594ebcac8fdee96cc88a1e3cc9d0bc
-
SSDEEP
6144:56GRoUrJmhUMW8kWJqscLn9ERjDSAprzlBcdF8:YGRoUrJVMW8dIsgmPpjaF8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2588 c633f49844e3c90790dab8c7ae97866f.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 c633f49844e3c90790dab8c7ae97866f.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 c633f49844e3c90790dab8c7ae97866f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2160 c633f49844e3c90790dab8c7ae97866f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2160 c633f49844e3c90790dab8c7ae97866f.exe 2588 c633f49844e3c90790dab8c7ae97866f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2588 2160 c633f49844e3c90790dab8c7ae97866f.exe 29 PID 2160 wrote to memory of 2588 2160 c633f49844e3c90790dab8c7ae97866f.exe 29 PID 2160 wrote to memory of 2588 2160 c633f49844e3c90790dab8c7ae97866f.exe 29 PID 2160 wrote to memory of 2588 2160 c633f49844e3c90790dab8c7ae97866f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c633f49844e3c90790dab8c7ae97866f.exe"C:\Users\Admin\AppData\Local\Temp\c633f49844e3c90790dab8c7ae97866f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\c633f49844e3c90790dab8c7ae97866f.exeC:\Users\Admin\AppData\Local\Temp\c633f49844e3c90790dab8c7ae97866f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD59af4f3762981fff4b046903b38f3c8a9
SHA1edc134e7d3fe85768c13d3634c4fb8a2dadc9dc3
SHA256cad2248d9710c999f181e6dd51cb46bb2a951ab57ff1d5aa64bdb3dbe5cdf97c
SHA512330cd63434d35c1535f2aa8a884622bb22d55c7b631aec9d7b43f927578079a3bf5d6357719b67936a88fcee7a6dbe0873507769d77a12b612f1a6c7c286d876