Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
d6cb7b365743ea24ece23560430bcb12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6cb7b365743ea24ece23560430bcb12.exe
Resource
win10v2004-20240226-en
General
-
Target
d6cb7b365743ea24ece23560430bcb12.exe
-
Size
82KB
-
MD5
d6cb7b365743ea24ece23560430bcb12
-
SHA1
3457acebf233225f5a84a1dfc6070270b6ca5ff1
-
SHA256
9398a31a263ab7b0ea07d48e85f07a3cef97b12bc7c8e3bcfecb6b138635df91
-
SHA512
1d404c750a38dc4bcc4dfd18e394edf25ee74dd7c790e0e07a189f2294d9091e55bb5c38e0e2ee2d0ef1b23a7626a45aef8fc529211e580d82cdd21bfb1360a9
-
SSDEEP
1536:bcjs3ctD+RrMOzVOpsIPdfrzcfwCbXFYc4RcjwsH2dmMa9:psh+RBUuI5cHWfUwNY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2236 d6cb7b365743ea24ece23560430bcb12.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 d6cb7b365743ea24ece23560430bcb12.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 d6cb7b365743ea24ece23560430bcb12.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 d6cb7b365743ea24ece23560430bcb12.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1152 d6cb7b365743ea24ece23560430bcb12.exe 2236 d6cb7b365743ea24ece23560430bcb12.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2236 1152 d6cb7b365743ea24ece23560430bcb12.exe 29 PID 1152 wrote to memory of 2236 1152 d6cb7b365743ea24ece23560430bcb12.exe 29 PID 1152 wrote to memory of 2236 1152 d6cb7b365743ea24ece23560430bcb12.exe 29 PID 1152 wrote to memory of 2236 1152 d6cb7b365743ea24ece23560430bcb12.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6cb7b365743ea24ece23560430bcb12.exe"C:\Users\Admin\AppData\Local\Temp\d6cb7b365743ea24ece23560430bcb12.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\d6cb7b365743ea24ece23560430bcb12.exeC:\Users\Admin\AppData\Local\Temp\d6cb7b365743ea24ece23560430bcb12.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD527bad8e5e267d8c5ff71f0af920f3418
SHA1994eebfbec8dcf705b22c86bb18765d7eb24a3fe
SHA256dbb8de5af34885b7da784663fdee82df2c15a3f49122ec93595683aa78a02460
SHA512f276e9355f8df5ebc0948867a156c23d74580c3d405f87873cf6499a31d1759c901f5b36f467a6864c8c0fc8f9fae12e238dbee9359d93cde4760ea4e4772dbd