Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
cc02075dc552c0b191297da25aefbc95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc02075dc552c0b191297da25aefbc95.exe
Resource
win10v2004-20240226-en
General
-
Target
cc02075dc552c0b191297da25aefbc95.exe
-
Size
82KB
-
MD5
cc02075dc552c0b191297da25aefbc95
-
SHA1
c8603e7c35b7c98972c39257717d9d4f0fb24bff
-
SHA256
5cbccdb841e2424f5821323fa5ded0a7925534024ec13ec4f762f99d9d1e2fd9
-
SHA512
097b906319ef8ea4af823c02fd0efe12f5f52b31f95122d2dc9d124b3ac1192b69395a87d86e7a78de29f5f42daac707bca4ccd96c7773f37b2bd8c6b621d318
-
SSDEEP
1536:XHIUU8nDHUDGhIIkkQRIU/JAP1rGZzu91Oy6gdRM9BUTW:XH5DpIzWU/iP16U1Oy6M0BUi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 cc02075dc552c0b191297da25aefbc95.exe -
Executes dropped EXE 1 IoCs
pid Process 2656 cc02075dc552c0b191297da25aefbc95.exe -
Loads dropped DLL 1 IoCs
pid Process 2504 cc02075dc552c0b191297da25aefbc95.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2504 cc02075dc552c0b191297da25aefbc95.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2504 cc02075dc552c0b191297da25aefbc95.exe 2656 cc02075dc552c0b191297da25aefbc95.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2656 2504 cc02075dc552c0b191297da25aefbc95.exe 28 PID 2504 wrote to memory of 2656 2504 cc02075dc552c0b191297da25aefbc95.exe 28 PID 2504 wrote to memory of 2656 2504 cc02075dc552c0b191297da25aefbc95.exe 28 PID 2504 wrote to memory of 2656 2504 cc02075dc552c0b191297da25aefbc95.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe"C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exeC:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2656
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD523fa6a144cf41eb778abcc16cc97f386
SHA1d47bb3bc6411da521f50e3934459520cff5703ac
SHA256a957ed64cc865e9a3c54fca61d57a5fe134953766a3490696a32e7c79254fa4e
SHA512f5b6e7faabdd60bc41ab00a208804f0a299575c54dcadb1e902e76f2b7704c7a27697d822bfdc011fe5fd071cc42f7f0039a0b5eaecdbef205a7dcf348275043