Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 16:44
Behavioral task
behavioral1
Sample
c6602030c951a5b45c92d2837f982470.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6602030c951a5b45c92d2837f982470.exe
Resource
win10v2004-20240226-en
General
-
Target
c6602030c951a5b45c92d2837f982470.exe
-
Size
5.8MB
-
MD5
c6602030c951a5b45c92d2837f982470
-
SHA1
e39d1347aadeaaa33eaa11cd20d106f9cfb3232a
-
SHA256
974a44a9064a8382a42c5c15439cc8755c35a9590fa4dd2645005c5c7090b240
-
SHA512
eeeb2665596022c046e9adf24a3289a4d8d9c340ef972b3e4d699d6fd14e16331023be648a2eae09e780e37855d714db0fa8976a4b31992d4e04ab9ba0e1c0f8
-
SSDEEP
98304:7HflUSAIvmIhgHau42c1joCjMPkNwk6alDAqD7z3uboHau42c1joCjMPkNwk6:T9UWvmIhyauq1jI86FA7y2auq1jI86
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 c6602030c951a5b45c92d2837f982470.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 c6602030c951a5b45c92d2837f982470.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 c6602030c951a5b45c92d2837f982470.exe -
resource yara_rule behavioral1/memory/2364-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012251-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2364 c6602030c951a5b45c92d2837f982470.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2364 c6602030c951a5b45c92d2837f982470.exe 2620 c6602030c951a5b45c92d2837f982470.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2620 2364 c6602030c951a5b45c92d2837f982470.exe 28 PID 2364 wrote to memory of 2620 2364 c6602030c951a5b45c92d2837f982470.exe 28 PID 2364 wrote to memory of 2620 2364 c6602030c951a5b45c92d2837f982470.exe 28 PID 2364 wrote to memory of 2620 2364 c6602030c951a5b45c92d2837f982470.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6602030c951a5b45c92d2837f982470.exe"C:\Users\Admin\AppData\Local\Temp\c6602030c951a5b45c92d2837f982470.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\c6602030c951a5b45c92d2837f982470.exeC:\Users\Admin\AppData\Local\Temp\c6602030c951a5b45c92d2837f982470.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5373a0c33d644ac3a3fa17c9b02be37fc
SHA1b6d2238eaa499e4404371c611a322a3f5b4b6581
SHA2561cfd31cfb21fc43657597ed5e8359212c2fcb90cfbd5545a8e5d3af89936ee8c
SHA512b7b21e4db6dba62f292352caa42ff254aae8be577347de8b71e4cccbd678f9506afef818f08ce4b11cbe36db52afcd3671faa11f153afdebc622ba2cacb25f61