Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 15:51
Behavioral task
behavioral1
Sample
c902dc471d674075231e28d92f6f63d6.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c902dc471d674075231e28d92f6f63d6.exe
Resource
win10v2004-20240226-en
General
-
Target
c902dc471d674075231e28d92f6f63d6.exe
-
Size
1.3MB
-
MD5
c902dc471d674075231e28d92f6f63d6
-
SHA1
08d4107603bddd99dea434c1287cea2c38003cb3
-
SHA256
338fdaafc07860fd81c11338f15e1e7357ad94c3938eb5b109a3c5845cc4cecf
-
SHA512
95906adf1bf5d267f102015158c61faf301697eb079af543db04f27192ccc2f98d1666a7169fbd7b3b8d27aae778acea0afcc4eea7e509c4a912d93d1744563f
-
SSDEEP
24576:eWGOwzHPlt/xb3K5nKkCw269ao6MkpgTsKsFf6gDbZ+c1/qKiMDWO:8Pn/xbqK5r69aOkpfdkgDdFlvDf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2368 c902dc471d674075231e28d92f6f63d6.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 c902dc471d674075231e28d92f6f63d6.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 c902dc471d674075231e28d92f6f63d6.exe -
resource yara_rule behavioral1/memory/2100-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012339-10.dat upx behavioral1/memory/2368-17-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2100 c902dc471d674075231e28d92f6f63d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2100 c902dc471d674075231e28d92f6f63d6.exe 2368 c902dc471d674075231e28d92f6f63d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2368 2100 c902dc471d674075231e28d92f6f63d6.exe 28 PID 2100 wrote to memory of 2368 2100 c902dc471d674075231e28d92f6f63d6.exe 28 PID 2100 wrote to memory of 2368 2100 c902dc471d674075231e28d92f6f63d6.exe 28 PID 2100 wrote to memory of 2368 2100 c902dc471d674075231e28d92f6f63d6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c902dc471d674075231e28d92f6f63d6.exe"C:\Users\Admin\AppData\Local\Temp\c902dc471d674075231e28d92f6f63d6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\c902dc471d674075231e28d92f6f63d6.exeC:\Users\Admin\AppData\Local\Temp\c902dc471d674075231e28d92f6f63d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55b7d79686c71f305960d406f9d4644ec
SHA18dacafb8bcf94177c923f38edb018daf8bfa3d8c
SHA2561f15932bdf60500e02f46fad229b60ba3c51839052dd564da4f4d5b321c14dd1
SHA5123a7c1c65ae704122a327c24bfb576b5721e3a49e9136a11948d289b917320e41bcef02d4feefe52275fe10d7969cbe1a9056b225a3c59c7b0fc091421cc51911