Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 07:59

General

  • Target

    8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe

  • Size

    223KB

  • MD5

    b41acc3d975e89a5dc131fa5876d319e

  • SHA1

    044f701f8ae146b7ed329aa180bf429bf0486be9

  • SHA256

    8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c

  • SHA512

    db067c947891cff3dccdfd5fece3545cc68a673d60dce2f683604fdd05dc4ad87801f7e93d3077342ee613aeadd516840ec3333605630fcf464b10e8367bca42

  • SSDEEP

    3072:ZxNgFLDtAXc/ZXfiBuI0+fgrcyhkdO7ZuQNdoLRXG8rGLZH1jl8SwxB8lyoaQ6sl:fNisc/qDpfgt1uQ/lLm4ZaQ6soWd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe
    "C:\Users\Admin\AppData\Local\Temp\8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe
      C:\Users\Admin\AppData\Local\Temp\8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8cbafe0bed7343ecf14df28760b89d48ad39efe3ccf34203156348b62b2ce21c.exe

    Filesize

    223KB

    MD5

    8c3b05ab698749c9cb3b3459285ad138

    SHA1

    460499d7c59ebed005acac556c8dfe0d5a6d2438

    SHA256

    d821585f20c2896f8ad62a41f5ed4f38b2597c8e3506b090fd0e3be44c61a0af

    SHA512

    95a20406fbcc58553f911606c6a5ee57a0f31f69c64184296d4964646f8bee78586c18ac6af5808a0aaf8148e4b14f6c36648d92aec55029a622b8fdc31aa791

  • memory/1812-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1812-8-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3060-10-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/3060-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3060-13-0x0000000000180000-0x00000000001C6000-memory.dmp

    Filesize

    280KB

  • memory/3060-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB