Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
c77c52ee547d6ebe30a5a27020a9fba3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c77c52ee547d6ebe30a5a27020a9fba3.exe
Resource
win10v2004-20240226-en
General
-
Target
c77c52ee547d6ebe30a5a27020a9fba3.exe
-
Size
1.9MB
-
MD5
c77c52ee547d6ebe30a5a27020a9fba3
-
SHA1
21ced22cecfd838ecc42df1fcdf559496087ca61
-
SHA256
beee087eb16700e659673e8f235599715ac64744e5c13413b28e69721af677fa
-
SHA512
ba4ab73e38c027e575e7390cd9a77b125ce8b08b23f0a46860a15c74a1198c659b80d6e6f4ba85c256dd512c63405d181bdd58d1693317701d1a34de699f3899
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dqPHuhZd+w4lLdDb/8mT79+OdI7EWukHYmZMT:Qoa1taC070doCb+vd//3klboaKaPQH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 532F.tmp -
Executes dropped EXE 1 IoCs
pid Process 1956 532F.tmp -
Loads dropped DLL 1 IoCs
pid Process 1488 c77c52ee547d6ebe30a5a27020a9fba3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1956 1488 c77c52ee547d6ebe30a5a27020a9fba3.exe 28 PID 1488 wrote to memory of 1956 1488 c77c52ee547d6ebe30a5a27020a9fba3.exe 28 PID 1488 wrote to memory of 1956 1488 c77c52ee547d6ebe30a5a27020a9fba3.exe 28 PID 1488 wrote to memory of 1956 1488 c77c52ee547d6ebe30a5a27020a9fba3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe"C:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\532F.tmp"C:\Users\Admin\AppData\Local\Temp\532F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe C7FEE227B5B1AF1E055CF63BF07FB3DC0F1DEC1E0A40996DCE8804773BD9387075156A55955303668FD3DC9698ECBBC380FE7579D25725015D8DD1285E9A73C52⤵
- Deletes itself
- Executes dropped EXE
PID:1956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5cb0f3a4f59584745394f53da8e05822c
SHA13de92cf29cbf71fc5916645fb57fe90bb2a942a9
SHA2562069ab584e842db4ea61c5ee77471799d5a26ae285d08412b77915fc3480b652
SHA512e5f096af28650a25a9b96acfa59851df16e53c09ed671ffab90bf6eb97672a9fe520b04067a700c12061d3edf5100d0a384ae49a905b31a04d36ebcd818cff3f