Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 07:16

General

  • Target

    cacfcdc1f485b2078914cc0c7a9e3ecf.exe

  • Size

    82KB

  • MD5

    cacfcdc1f485b2078914cc0c7a9e3ecf

  • SHA1

    32f43858cf4eacc8af9dc45a4018993774515f59

  • SHA256

    c6b16b12dda09c8ce8a5d1697c08958b535a35393fcf6dffe545547fe9645df1

  • SHA512

    078b4a52c47be457a98d54b87f9eff3cd52051b33ffdc5698a0fef56c1fbcd7b3a3be15a75d26bf579251e1d588ea6642d45e840709cf3291e01e2e2cec7427a

  • SSDEEP

    1536:V1dTUk+Db7XFzXHb1lU9fhfctR8x5aelQINnvXb1optZ:tUkwXYVpctTINnvrstZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cacfcdc1f485b2078914cc0c7a9e3ecf.exe
    "C:\Users\Admin\AppData\Local\Temp\cacfcdc1f485b2078914cc0c7a9e3ecf.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\cacfcdc1f485b2078914cc0c7a9e3ecf.exe
      C:\Users\Admin\AppData\Local\Temp\cacfcdc1f485b2078914cc0c7a9e3ecf.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cacfcdc1f485b2078914cc0c7a9e3ecf.exe

    Filesize

    82KB

    MD5

    6a7dedcebb1f3c9b0f3e1f0a4c0789bd

    SHA1

    1e08088f3811cbcbcd9918bb98b9ec59a1ce2e9a

    SHA256

    3dfd98e27b18ea7e57b42433cdbcaa7ebd13d4f240252908f0bff10c54086e7f

    SHA512

    559c6c9d9e9bb6939a2c7b261b824b277339daeb8bc58ae525a3f2092382284d0895545824ab38fb3eed093405f6e22c7aae349857aeeacedffd59d985a57d52

  • memory/3428-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3428-1-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/3428-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3428-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3660-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3660-16-0x00000000001C0000-0x00000000001EF000-memory.dmp

    Filesize

    188KB

  • memory/3660-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3660-24-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB