Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
cd16c606715a2ca63b729d192c8e6b28.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd16c606715a2ca63b729d192c8e6b28.exe
Resource
win10v2004-20240226-en
General
-
Target
cd16c606715a2ca63b729d192c8e6b28.exe
-
Size
82KB
-
MD5
cd16c606715a2ca63b729d192c8e6b28
-
SHA1
fbe2427b04aefc45366caf25401cf5d37cd5a409
-
SHA256
adaf74c70a1da2fd33ee6e78ca5852b1eaf2761da0582d88aaa5b9214f586481
-
SHA512
68609b0a3889141ab7605fd4f205bb2d5d289afcf581cf2b579ea2e06819ef4f90d25af7319ea92edf27f03a7c8dc57905cbb2c765fc2b15c33e0876b027736d
-
SSDEEP
1536:BCVxYyJLZm3c9Fsua2HF+aQxfpIEeh7f7Ouc8BloY9DZr61eD8T4Bqk3ysl:EVlpZms9FvaUQaQxfKvf7pHXooujvkB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 cd16c606715a2ca63b729d192c8e6b28.exe -
Executes dropped EXE 1 IoCs
pid Process 1468 cd16c606715a2ca63b729d192c8e6b28.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 cd16c606715a2ca63b729d192c8e6b28.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 cd16c606715a2ca63b729d192c8e6b28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 cd16c606715a2ca63b729d192c8e6b28.exe 1468 cd16c606715a2ca63b729d192c8e6b28.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1468 3012 cd16c606715a2ca63b729d192c8e6b28.exe 29 PID 3012 wrote to memory of 1468 3012 cd16c606715a2ca63b729d192c8e6b28.exe 29 PID 3012 wrote to memory of 1468 3012 cd16c606715a2ca63b729d192c8e6b28.exe 29 PID 3012 wrote to memory of 1468 3012 cd16c606715a2ca63b729d192c8e6b28.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd16c606715a2ca63b729d192c8e6b28.exe"C:\Users\Admin\AppData\Local\Temp\cd16c606715a2ca63b729d192c8e6b28.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\cd16c606715a2ca63b729d192c8e6b28.exeC:\Users\Admin\AppData\Local\Temp\cd16c606715a2ca63b729d192c8e6b28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD59f01618a75b9478cbb95a4c0e48ee6cd
SHA1d646f347b34e30f7408b20139fad556ffbd8fe42
SHA256cd8ae8efcb6b8154c96e63903d80c0e10a153de614506124ac13ef89b788bb91
SHA512847f4a85d32ca6c71d021630dd37d76f2c4e9b928211a2014876d7fd75863ed7a1db81b312e3d38985519f0758fcc7979860df4801e813e27adf679bafc9bd0d