Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 04:39
Behavioral task
behavioral1
Sample
c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe
Resource
win10v2004-20240226-en
General
-
Target
c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe
-
Size
5.3MB
-
MD5
c7b5f5cbaeb9e4bd035e9adfbfb1802e
-
SHA1
a850a8f7362ad0dc92bed7b52acb0079e002b8b6
-
SHA256
b7a352b79f9a3fbc495bf4aca01565bd5dba69ee5cd6bf42046d7fee51b49f0d
-
SHA512
20d38a4456d94740ce978996168db21bb3ce0d4196823f3628f162742918674cfb8a2c67bbebcda233182abe6b3d20e3c2c495c2fb3d9f1e28db031a870b05db
-
SSDEEP
98304:kHSDPtQb+OSPv64i956mSLMWlP4LZKN8+vkExeBLSPv64i956mSLMW:kHq2b3SPv64i95HAMGKZKN8+zetSPv6x
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 864 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe -
Executes dropped EXE 1 IoCs
pid Process 864 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe -
resource yara_rule behavioral2/memory/3844-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000400000001e980-12.dat upx behavioral2/memory/864-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3844 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3844 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe 864 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3844 wrote to memory of 864 3844 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe 89 PID 3844 wrote to memory of 864 3844 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe 89 PID 3844 wrote to memory of 864 3844 c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe"C:\Users\Admin\AppData\Local\Temp\c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\c7b5f5cbaeb9e4bd035e9adfbfb1802e.exeC:\Users\Admin\AppData\Local\Temp\c7b5f5cbaeb9e4bd035e9adfbfb1802e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD540d6a1e921e6c15d5160176db03b48c9
SHA16d57b9bafc44b96e8b96239a3f24106a71b975cc
SHA256deca4d4a314c905e14e60ef7e5874e2bf1fa291cb3c333d612b90967c05749ef
SHA512a344b04ff6bf46e7f1e418c03b73c399573595d54fb5f14a59099ee253e3ea269269db2f5d990e9ada316bced302a5c83b4d21100c8d52e6543249507f776386