Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
cc857fc0bf4d9c75d3aaea9a69680bc4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc857fc0bf4d9c75d3aaea9a69680bc4.exe
Resource
win10v2004-20240226-en
General
-
Target
cc857fc0bf4d9c75d3aaea9a69680bc4.exe
-
Size
162KB
-
MD5
cc857fc0bf4d9c75d3aaea9a69680bc4
-
SHA1
73da6afa85a502fd1b4212dfd6d171867b354f9e
-
SHA256
9556261bd886bb60bb5b39708be9457f9ec820ccecfdf094a46d5e2efacdf8cb
-
SHA512
a7695b9dbdc2c30b15079959cbea53e5ee84535c66df889bffcd904069ab8fe20e1ada4fece5ca0769eb7e83d317ad3aaece29a6e17b6674263dccd0933680f3
-
SSDEEP
3072:XIVv2XBVwfVk4OCUXvNK+T/b8bITU02MJ2:XyEB2GpvNKGD8UU0RJ2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 cc857fc0bf4d9c75d3aaea9a69680bc4.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 cc857fc0bf4d9c75d3aaea9a69680bc4.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe 2956 cc857fc0bf4d9c75d3aaea9a69680bc4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2956 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe 29 PID 2164 wrote to memory of 2956 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe 29 PID 2164 wrote to memory of 2956 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe 29 PID 2164 wrote to memory of 2956 2164 cc857fc0bf4d9c75d3aaea9a69680bc4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc857fc0bf4d9c75d3aaea9a69680bc4.exe"C:\Users\Admin\AppData\Local\Temp\cc857fc0bf4d9c75d3aaea9a69680bc4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\cc857fc0bf4d9c75d3aaea9a69680bc4.exeC:\Users\Admin\AppData\Local\Temp\cc857fc0bf4d9c75d3aaea9a69680bc4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5877500885a220eaf22027a09f4dc6d05
SHA1bf4df98c0b4c1cff906d078e3a706dd6c3161ced
SHA25641d6036a0b80fef605059ae380e817c6afcf54aec9182d117cfdf3d0a24abb90
SHA51291f49597c4face636e14f592a8e80709b2b84ed85474f9bacf670f41896aa287d58fcf23d0e36072c6f02120934d3b7c4ff481064cc5d8c303931154800ebe15