Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 11:12
Behavioral task
behavioral1
Sample
cdeaf48bc44598a23f7d46900bbfe8d6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdeaf48bc44598a23f7d46900bbfe8d6.exe
Resource
win10v2004-20240226-en
General
-
Target
cdeaf48bc44598a23f7d46900bbfe8d6.exe
-
Size
2.7MB
-
MD5
cdeaf48bc44598a23f7d46900bbfe8d6
-
SHA1
f3fd13a9c0df1eed9825c8db3d535404a93fae14
-
SHA256
3360a76baf0a322e7dbf499ffae46883f16dff3dbd04b9088e61800682b03445
-
SHA512
5d285224a132c39d64355e2e5099ef489fe4a35c77f15bec91a4e32db57ae541c360c1607ae8278de1953fd7a365ab0df238759a7baaeea063ba83077c247abc
-
SSDEEP
49152:scUYroe2ViGXc4ODkCC6w6252YHuD3daeR9YdLnm9KOcDvOe0tUIZl3R9j:uYroXViCJODkCCK24iuD3dpH4mk7vTbK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 cdeaf48bc44598a23f7d46900bbfe8d6.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 cdeaf48bc44598a23f7d46900bbfe8d6.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe -
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000e000000012110-10.dat upx behavioral1/memory/2840-16-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral1/files/0x000e000000012110-15.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe 2840 cdeaf48bc44598a23f7d46900bbfe8d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2840 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe 28 PID 2180 wrote to memory of 2840 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe 28 PID 2180 wrote to memory of 2840 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe 28 PID 2180 wrote to memory of 2840 2180 cdeaf48bc44598a23f7d46900bbfe8d6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdeaf48bc44598a23f7d46900bbfe8d6.exe"C:\Users\Admin\AppData\Local\Temp\cdeaf48bc44598a23f7d46900bbfe8d6.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\cdeaf48bc44598a23f7d46900bbfe8d6.exeC:\Users\Admin\AppData\Local\Temp\cdeaf48bc44598a23f7d46900bbfe8d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD574aa0e797988f79d64383383f54c59ab
SHA189ee6d8c2e647b4e1c45ca0797805471d5cd54b2
SHA25656447998422d93fe330bceee7e51fef06623de1f7a99dbdee07b26f93e541401
SHA512b36ded93eb05f68d8064651f266195a8ef3e6d6da84c6e6b40ee5a0b1ec3576b1b63b01eee9d52abefce65e4876e69d0a98d9c4875038ccb720574eb2b402a6b
-
Filesize
2.3MB
MD5218d97e0fdd392eb51dc1fc61ff99149
SHA1541b89eae2c17b52b28bc66eb1bbaf6aaee2f1bd
SHA256f6c620c0e062674ef99975fb5d5d8c990f210734961290f1698f77c472193d13
SHA5122acbb8f62ec7d2752d82df1ca37a55a8a83afd04d482e8add1e004ae854af62a35f98d02fa5a7b9dfb29c58474d0991d48627b0a487c47c3a864a848b2f57004