Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
cd34894380c5be79aa7a6f0bda6ef2ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd34894380c5be79aa7a6f0bda6ef2ec.exe
Resource
win10v2004-20240226-en
General
-
Target
cd34894380c5be79aa7a6f0bda6ef2ec.exe
-
Size
82KB
-
MD5
cd34894380c5be79aa7a6f0bda6ef2ec
-
SHA1
25b0e9eb175785438e4fae56019c309e8e15c8c7
-
SHA256
01adfb1b0e5bde888dd4034b76711fc9222d868ffa65edeca9f33beee4417006
-
SHA512
293bac4a29f6ba70c9c781ac978413e29f5a83a7ea48ebc6fd08a974f5bebbe424aa840b3baf88cc87a4c3907ce7901ad1151e6359621463194d3570b5e2e5d0
-
SSDEEP
768:8CSqInTGxKV+E2lepHI9j/22T/5fMuMVrlvJC+5ZII1S+cAqFzCwaU0xDR6HKYtm:Zfvgdi9jHTNMV6I1GcRx0KYJbSJMEV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Loads dropped DLL 1 IoCs
pid Process 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe 2180 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2180 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe 29 PID 1652 wrote to memory of 2180 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe 29 PID 1652 wrote to memory of 2180 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe 29 PID 1652 wrote to memory of 2180 1652 cd34894380c5be79aa7a6f0bda6ef2ec.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe"C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exeC:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f73f4e73669b61d5602221ea779aa575
SHA1e7e54fbf986fd48dfc5699626b289e290a4a9acb
SHA256f25f909eb6dad0c4fcaa9fb7b41b3112508d1942e6ad1819b6d156d6781774f0
SHA51256006d6b780331abccc403dec44855c5af856a6cdc4b8a6ce4a73444dbc4bcbf5991edf7dbb2a2e78192af38779e4e2656b4d7e4a608a24e55c5e01a533875a0