Analysis
-
max time kernel
138s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 19:37
Behavioral task
behavioral1
Sample
cc4033c7a97b5682327556827373cb9d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cc4033c7a97b5682327556827373cb9d.exe
Resource
win10v2004-20240226-en
General
-
Target
cc4033c7a97b5682327556827373cb9d.exe
-
Size
5.3MB
-
MD5
cc4033c7a97b5682327556827373cb9d
-
SHA1
ae55f52f2377d3cdf58dd0d50331ff0a826e35dd
-
SHA256
fc3463cbfbb6dc8717f2d17880b37556c37648a5736904fe24816ae209aea938
-
SHA512
bef368f32da8ebf694dbdfc2ebb48491d32f7b3a517973893ef97f4b056b02d2a55566c147254217ef1d4c6fb85b87a24ab0e7742c839ceccafe356c5a2f897d
-
SSDEEP
98304:svRp2hvnVvc9MCMdBX63d4SOxqQ3vdMf3FxqEJTM63d4SOxqQ3:A2hhcGD6lyqMUL5M6lyqM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 700 cc4033c7a97b5682327556827373cb9d.exe -
Executes dropped EXE 1 IoCs
pid Process 700 cc4033c7a97b5682327556827373cb9d.exe -
resource yara_rule behavioral2/memory/2876-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000700000002322a-12.dat upx behavioral2/memory/700-14-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2876 cc4033c7a97b5682327556827373cb9d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2876 cc4033c7a97b5682327556827373cb9d.exe 700 cc4033c7a97b5682327556827373cb9d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 700 2876 cc4033c7a97b5682327556827373cb9d.exe 93 PID 2876 wrote to memory of 700 2876 cc4033c7a97b5682327556827373cb9d.exe 93 PID 2876 wrote to memory of 700 2876 cc4033c7a97b5682327556827373cb9d.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4033c7a97b5682327556827373cb9d.exe"C:\Users\Admin\AppData\Local\Temp\cc4033c7a97b5682327556827373cb9d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\cc4033c7a97b5682327556827373cb9d.exeC:\Users\Admin\AppData\Local\Temp\cc4033c7a97b5682327556827373cb9d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5144814dfc525c6feed819abe46bb8daf
SHA1128bc23bf8c8788fdc97ab1932fcc324e6470345
SHA256de4a9a58f09e51a9fbe4b13a529b3e10410c373da9bd0c8e467eeb0e21b02dbc
SHA51283dffe1c9d365cf022fac39b17aed9d28de6c2302e1b70c4f5e1516aa323142efa11d774077f91c4f064faa826ce8bdc959ee6b09de890ac6ed3fa8b82215327