Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 17:33

General

  • Target

    cc02075dc552c0b191297da25aefbc95.exe

  • Size

    82KB

  • MD5

    cc02075dc552c0b191297da25aefbc95

  • SHA1

    c8603e7c35b7c98972c39257717d9d4f0fb24bff

  • SHA256

    5cbccdb841e2424f5821323fa5ded0a7925534024ec13ec4f762f99d9d1e2fd9

  • SHA512

    097b906319ef8ea4af823c02fd0efe12f5f52b31f95122d2dc9d124b3ac1192b69395a87d86e7a78de29f5f42daac707bca4ccd96c7773f37b2bd8c6b621d318

  • SSDEEP

    1536:XHIUU8nDHUDGhIIkkQRIU/JAP1rGZzu91Oy6gdRM9BUTW:XH5DpIzWU/iP16U1Oy6M0BUi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe
    "C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe
      C:\Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\cc02075dc552c0b191297da25aefbc95.exe

          Filesize

          82KB

          MD5

          23fa6a144cf41eb778abcc16cc97f386

          SHA1

          d47bb3bc6411da521f50e3934459520cff5703ac

          SHA256

          a957ed64cc865e9a3c54fca61d57a5fe134953766a3490696a32e7c79254fa4e

          SHA512

          f5b6e7faabdd60bc41ab00a208804f0a299575c54dcadb1e902e76f2b7704c7a27697d822bfdc011fe5fd071cc42f7f0039a0b5eaecdbef205a7dcf348275043

        • memory/2504-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2504-2-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/2504-1-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2504-15-0x0000000001430000-0x000000000145F000-memory.dmp

          Filesize

          188KB

        • memory/2504-14-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2656-17-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2656-18-0x0000000000140000-0x000000000016F000-memory.dmp

          Filesize

          188KB

        • memory/2656-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2656-29-0x00000000001B0000-0x00000000001CB000-memory.dmp

          Filesize

          108KB