Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
cd34894380c5be79aa7a6f0bda6ef2ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd34894380c5be79aa7a6f0bda6ef2ec.exe
Resource
win10v2004-20240226-en
General
-
Target
cd34894380c5be79aa7a6f0bda6ef2ec.exe
-
Size
82KB
-
MD5
cd34894380c5be79aa7a6f0bda6ef2ec
-
SHA1
25b0e9eb175785438e4fae56019c309e8e15c8c7
-
SHA256
01adfb1b0e5bde888dd4034b76711fc9222d868ffa65edeca9f33beee4417006
-
SHA512
293bac4a29f6ba70c9c781ac978413e29f5a83a7ea48ebc6fd08a974f5bebbe424aa840b3baf88cc87a4c3907ce7901ad1151e6359621463194d3570b5e2e5d0
-
SSDEEP
768:8CSqInTGxKV+E2lepHI9j/22T/5fMuMVrlvJC+5ZII1S+cAqFzCwaU0xDR6HKYtm:Zfvgdi9jHTNMV6I1GcRx0KYJbSJMEV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4924 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2816 cd34894380c5be79aa7a6f0bda6ef2ec.exe 4924 cd34894380c5be79aa7a6f0bda6ef2ec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4924 2816 cd34894380c5be79aa7a6f0bda6ef2ec.exe 88 PID 2816 wrote to memory of 4924 2816 cd34894380c5be79aa7a6f0bda6ef2ec.exe 88 PID 2816 wrote to memory of 4924 2816 cd34894380c5be79aa7a6f0bda6ef2ec.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe"C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exeC:\Users\Admin\AppData\Local\Temp\cd34894380c5be79aa7a6f0bda6ef2ec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b6c177c8dcf08deb7d0b2f4f10c29175
SHA1a83557d5c87dd1f999f4724ebc732c9ee1fdc64c
SHA256c1c483e0b3cf3bcfd7b5bc9bbb69003244b752dfc5bce5db1a4b376a8022efb5
SHA512959641a88957123620d0d53ab497cf808111061650156ef202fe3ccdc72c202d918466c1569a08310587e71142649afe495f4d0e439b7a5653aa0b129363420e