Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:58
Behavioral task
behavioral1
Sample
c97d768a35ad16db4113ffe661f87b9b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c97d768a35ad16db4113ffe661f87b9b.exe
Resource
win10v2004-20240226-en
General
-
Target
c97d768a35ad16db4113ffe661f87b9b.exe
-
Size
1.5MB
-
MD5
c97d768a35ad16db4113ffe661f87b9b
-
SHA1
d678e1114f3c4cb929001b6e54553bf00e524cda
-
SHA256
38051aa465dd8fe7034a47e130541065bd35f8fb222813e49cd5bb8de829d0b8
-
SHA512
a8d017da952fc248fb02fb278a6d46a8c1b1c33d2eec62ef5f437e3be53f74413c8da37e31ea402a4c9ca25a9561c4049cdd3b771b921ec307049f0f3498da67
-
SSDEEP
24576:StAfrvoQUjwfWZRtWVe/bwZI1v2MuB6ZfU0psZNfOI/ylGO0Y6czoCW:StAfsQlfWZGVOQI1XuB6dUYsjp/ylGOr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2588 c97d768a35ad16db4113ffe661f87b9b.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 c97d768a35ad16db4113ffe661f87b9b.exe -
Loads dropped DLL 1 IoCs
pid Process 2084 c97d768a35ad16db4113ffe661f87b9b.exe -
resource yara_rule behavioral1/memory/2084-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000c000000012233-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 c97d768a35ad16db4113ffe661f87b9b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 c97d768a35ad16db4113ffe661f87b9b.exe 2588 c97d768a35ad16db4113ffe661f87b9b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2588 2084 c97d768a35ad16db4113ffe661f87b9b.exe 28 PID 2084 wrote to memory of 2588 2084 c97d768a35ad16db4113ffe661f87b9b.exe 28 PID 2084 wrote to memory of 2588 2084 c97d768a35ad16db4113ffe661f87b9b.exe 28 PID 2084 wrote to memory of 2588 2084 c97d768a35ad16db4113ffe661f87b9b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c97d768a35ad16db4113ffe661f87b9b.exe"C:\Users\Admin\AppData\Local\Temp\c97d768a35ad16db4113ffe661f87b9b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\c97d768a35ad16db4113ffe661f87b9b.exeC:\Users\Admin\AppData\Local\Temp\c97d768a35ad16db4113ffe661f87b9b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e26c68b57d7cd1d57916cab6e6e66705
SHA1963de93e6c1805c2fb1a58df17ba750da7f59020
SHA256268f2b36cab6f374a68fd59175da822b355fda3b6b20fbb82eac0d2db3014a7f
SHA512c4b77df8655bf2bc94787121483fdb12fdec9d4f1f17c59171538132699770ed9a19cd732d1a6121ee1c9b0a554dd5fa3563310e06fc9d550bd42765288c03a4