Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 01:23
Behavioral task
behavioral1
Sample
c7535146451d9d744e2807c6d5264675.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c7535146451d9d744e2807c6d5264675.exe
Resource
win10v2004-20240226-en
General
-
Target
c7535146451d9d744e2807c6d5264675.exe
-
Size
2.9MB
-
MD5
c7535146451d9d744e2807c6d5264675
-
SHA1
e802afc3b9694d183b2921b3aba438e4944847b0
-
SHA256
13d95ba4c0b1bc0e8d76ce667065ea3d2c0217f601ead878fc31a1119a9045da
-
SHA512
55f07162d54b30958606c3f83a10653a8be78ce21196b8f6522d3642e25f3be57c98d8e862443cfbf859dbc4308c0e2927607888a80a3e6ae21c109770d2f3e5
-
SSDEEP
49152:elIrh3oZD2vS2y/OznAqGzE2N/5tLN74NH5HUyNRcUsCVOzetdZJ:eq1nvSSEqv2N/zL4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2512 c7535146451d9d744e2807c6d5264675.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 c7535146451d9d744e2807c6d5264675.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 c7535146451d9d744e2807c6d5264675.exe -
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x0009000000012252-13.dat upx behavioral1/files/0x0009000000012252-12.dat upx behavioral1/files/0x0009000000012252-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2156 c7535146451d9d744e2807c6d5264675.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 c7535146451d9d744e2807c6d5264675.exe 2512 c7535146451d9d744e2807c6d5264675.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2512 2156 c7535146451d9d744e2807c6d5264675.exe 28 PID 2156 wrote to memory of 2512 2156 c7535146451d9d744e2807c6d5264675.exe 28 PID 2156 wrote to memory of 2512 2156 c7535146451d9d744e2807c6d5264675.exe 28 PID 2156 wrote to memory of 2512 2156 c7535146451d9d744e2807c6d5264675.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7535146451d9d744e2807c6d5264675.exe"C:\Users\Admin\AppData\Local\Temp\c7535146451d9d744e2807c6d5264675.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\c7535146451d9d744e2807c6d5264675.exeC:\Users\Admin\AppData\Local\Temp\c7535146451d9d744e2807c6d5264675.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2512
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD50b1a6069c8f848c9b1b59efeb480119b
SHA186baea59f580e0d5dae9cfbae32c2be1cf3eee67
SHA256c4349a3f514fdd6f72e2c16e1f7354475c3939d1967362c6ad048657c626a8f2
SHA512d8dbffaed12511db3c01582c2625083a650922b61055ddf027fa2430a14afa89fa3921cfd53013422c9617b4b43a4ab1167a84d0385204cdd0e5ba0b907eae48
-
Filesize
280KB
MD5c7a97ecbf54cd34d3c00685672758dea
SHA19eb1fac629e6fff12c729db7298d28fd55a22dbe
SHA256e8b3eaff8a06fda8c6209afd86f3c2b1666144470593c100df5da4f73adf363c
SHA5125abf4845493647174c6846deab13b589744e2ed515d9d1b091d55546712dd76fa15076c8fb9bd988b8ad831ab26501b112b8ca194fe7c7d0348baea9a446245c
-
Filesize
672KB
MD568926d91115cd49a0e8d7a1b530b4289
SHA1b312fdd25597b17eb7852b0c1cd9493ff0f8f29d
SHA2566cfc1742a8a0ada9eb36c3882556f86332929c92ee9706a91063a5b40dfa295f
SHA5121188ece1af2b6474995e5c1aa61affeaecc0da8fde9f8958260da3a8eb5e3195b805d5715b13160fb7594179a3db3ef6b9288f17cc474819ccbacafe63d98574