Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 06:50
Behavioral task
behavioral1
Sample
cd64790e24e9046f362574187c17a511.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd64790e24e9046f362574187c17a511.exe
Resource
win10v2004-20240226-en
General
-
Target
cd64790e24e9046f362574187c17a511.exe
-
Size
5.8MB
-
MD5
cd64790e24e9046f362574187c17a511
-
SHA1
9a61e2d780cd4e1138f03042c030cfc62d6d04eb
-
SHA256
e52d0c415dde2d6da9c5b3c357fbab265c020684cd3e287533e2ca0d79890a2c
-
SHA512
90838be5d255a6d5872626563648173163fa686a65408acc4b17fe6408b711eba7a3e2ab189ab0cdff6348335c5b953158a6d4f5ddf14762a2394d2cd20cd406
-
SSDEEP
98304:Hzp5qjtsizFJyaGQZaXhP5a9UEI+eG9jAkbkR79D+cVItGQZaXhP5a9UEI+eG:H2jOiryUGhRaaCkN9qHGhRa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 cd64790e24e9046f362574187c17a511.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 cd64790e24e9046f362574187c17a511.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 cd64790e24e9046f362574187c17a511.exe -
resource yara_rule behavioral1/memory/1504-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000b000000012256-10.dat upx behavioral1/files/0x000b000000012256-15.dat upx behavioral1/memory/2180-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1504 cd64790e24e9046f362574187c17a511.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1504 cd64790e24e9046f362574187c17a511.exe 2180 cd64790e24e9046f362574187c17a511.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2180 1504 cd64790e24e9046f362574187c17a511.exe 28 PID 1504 wrote to memory of 2180 1504 cd64790e24e9046f362574187c17a511.exe 28 PID 1504 wrote to memory of 2180 1504 cd64790e24e9046f362574187c17a511.exe 28 PID 1504 wrote to memory of 2180 1504 cd64790e24e9046f362574187c17a511.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd64790e24e9046f362574187c17a511.exe"C:\Users\Admin\AppData\Local\Temp\cd64790e24e9046f362574187c17a511.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\cd64790e24e9046f362574187c17a511.exeC:\Users\Admin\AppData\Local\Temp\cd64790e24e9046f362574187c17a511.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5c2a6909cf940e10c93a31af8b2c3b553
SHA109578b38e5175555e939d5f8ee7e6c892680d867
SHA256389f8e3e7ece45700752a0c4a0aaf0c3fd48528621e16dc42efd3a10732b53c6
SHA512e941d88c75a14795b4c1d3f53c7a1b200875d42daac35dcc24cfc7efb961809bc46b5c3c5a25ac1c0131a2036db3247fde752fe8bd85d10fa88e5eaca585c352
-
Filesize
192KB
MD5fa844e73578cfcf574d97755360793a7
SHA191af34e411b635bc635518da87bd7e0579c96d9a
SHA2564856980b2b3135c897062f6668fc2830ca59b0d223a79db9531218fe84edf1f8
SHA51259b3f417535f68bbb04627db8c101d31f0efefc524ee3f6359a39e02e33d6dafb685e5943f649873fbaa1cabb5472c652217ede68e3fbaba358ed5d6d7d678cb