Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
ca4469f93269d98a110fc02c2f0d8e2d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ca4469f93269d98a110fc02c2f0d8e2d.exe
Resource
win10v2004-20240226-en
General
-
Target
ca4469f93269d98a110fc02c2f0d8e2d.exe
-
Size
82KB
-
MD5
ca4469f93269d98a110fc02c2f0d8e2d
-
SHA1
d5da46e2354859320e48525b2b36a70da0e07882
-
SHA256
787f64d6aa57a62d8cfd149d870859bcf286d2e13380701c400c01635abd043f
-
SHA512
9792f3ad29a88b302daa504f714762ab0ca73f06cc18d4354a7627549327ee8b3280174827c5b186205abaa97a9b66e2c4a8407b3e96ca1ff0752913e3bf5211
-
SSDEEP
1536:XX4P9KfDWYNE1Fmjbsd2ttVAjwBI2jvAajptm/RvFr9PMH8uemAV4Wwgd8f613gK:YPuELTdFj1qAajXItr9kHBpXWoy1pF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4188 ca4469f93269d98a110fc02c2f0d8e2d.exe -
Executes dropped EXE 1 IoCs
pid Process 4188 ca4469f93269d98a110fc02c2f0d8e2d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1900 ca4469f93269d98a110fc02c2f0d8e2d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1900 ca4469f93269d98a110fc02c2f0d8e2d.exe 4188 ca4469f93269d98a110fc02c2f0d8e2d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4188 1900 ca4469f93269d98a110fc02c2f0d8e2d.exe 92 PID 1900 wrote to memory of 4188 1900 ca4469f93269d98a110fc02c2f0d8e2d.exe 92 PID 1900 wrote to memory of 4188 1900 ca4469f93269d98a110fc02c2f0d8e2d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4469f93269d98a110fc02c2f0d8e2d.exe"C:\Users\Admin\AppData\Local\Temp\ca4469f93269d98a110fc02c2f0d8e2d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\ca4469f93269d98a110fc02c2f0d8e2d.exeC:\Users\Admin\AppData\Local\Temp\ca4469f93269d98a110fc02c2f0d8e2d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD594fff38921c97c3bed6f0294b88042e0
SHA1387f85e73b5fa99171bfdb2bd1d8b29017d7f270
SHA25607f892910d49a380eeb4e2de2e6a2376403523604bba634876e80dceb5a798cc
SHA512e42d70303ff9dd84cb76370223ee93673d9608c94463e2b58d5a4b6e0ef39d86afec0fd1bb551e200f6059570eefd4a03ae194e55c0a07bcfefc0db3e166bcb2