Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 23:50
Behavioral task
behavioral1
Sample
cc91bb97b4d91b039ef8681a91a7df08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc91bb97b4d91b039ef8681a91a7df08.exe
Resource
win10v2004-20240226-en
General
-
Target
cc91bb97b4d91b039ef8681a91a7df08.exe
-
Size
1.5MB
-
MD5
cc91bb97b4d91b039ef8681a91a7df08
-
SHA1
8f759a9fc29032bbc8920e8d7e4fb9450e129236
-
SHA256
d90739e547c7725392b040458d576fb9c4339fef750305b9a12efd9720738ae4
-
SHA512
cc2df3255ecee0c6ddc77b9792166d7a67f981775a9c459077af29670fc7bb7fbc90f80f4cf4c4bcaf0c79320af31370cbb826433a1a8cc306f938c8c30db8e4
-
SSDEEP
24576:p46LpKzr/A7kII1KuSfks4i0rrBB3xCh4aHPHvvWz9cKskeW:bnwx1SMrBoHPHWmme
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cc91bb97b4d91b039ef8681a91a7df08.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 cc91bb97b4d91b039ef8681a91a7df08.exe -
resource yara_rule behavioral2/memory/1540-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e59e-11.dat upx behavioral2/memory/2660-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1540 cc91bb97b4d91b039ef8681a91a7df08.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1540 cc91bb97b4d91b039ef8681a91a7df08.exe 2660 cc91bb97b4d91b039ef8681a91a7df08.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2660 1540 cc91bb97b4d91b039ef8681a91a7df08.exe 87 PID 1540 wrote to memory of 2660 1540 cc91bb97b4d91b039ef8681a91a7df08.exe 87 PID 1540 wrote to memory of 2660 1540 cc91bb97b4d91b039ef8681a91a7df08.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc91bb97b4d91b039ef8681a91a7df08.exe"C:\Users\Admin\AppData\Local\Temp\cc91bb97b4d91b039ef8681a91a7df08.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\cc91bb97b4d91b039ef8681a91a7df08.exeC:\Users\Admin\AppData\Local\Temp\cc91bb97b4d91b039ef8681a91a7df08.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56684b4dd8ff791cb919275ac8a3ffc72
SHA1fd0c1357ec39ddb2e653a539e1ae0043ed022d3f
SHA256c271722d86998a4a93c735d10e339645286e9664324ff6188a1ea8b395b6ef52
SHA51286e0cb8cf5e7622fb0d924fffa951535282aabba9888df01905c87d173a203e1c05d7c823461f72076c17da372fcf61cccf8cb081f901d2f345f9bc4a1244b12