Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe
Resource
win10v2004-20231215-en
General
-
Target
cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe
-
Size
218KB
-
MD5
f56ceecc3aaa647e80fecbd42c78d210
-
SHA1
a68bc41db77770e7b85c96e0ba55755c0e0c00d6
-
SHA256
cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47
-
SHA512
86f29501f33b0c632ec9115df17bc6c28e2dad6145d4c8f0375fefd92ed12e3b9f1e2f60af4d3165a537baeaee6410914600b307ac67ef74560f95cf82fef6b7
-
SSDEEP
3072:u45gkcYusEcTpeJjuDGNTmqC97EJ3YB19HU3AuuZTwar3xKWdwqbRpmiaoG9Qxs3:H32cNekCEqhXsr3FwqbX9aLisM+Nea
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1688 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe -
Executes dropped EXE 1 IoCs
pid Process 1688 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe -
Loads dropped DLL 1 IoCs
pid Process 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1688 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1688 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe 29 PID 1916 wrote to memory of 1688 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe 29 PID 1916 wrote to memory of 1688 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe 29 PID 1916 wrote to memory of 1688 1916 cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe"C:\Users\Admin\AppData\Local\Temp\cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exeC:\Users\Admin\AppData\Local\Temp\cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1688
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cb7d4b84dce2127692e605e23618eec5cfc2fb26d57ff338b3dec273f9f1db47.exe
Filesize218KB
MD5951cb0a2e211c7da8d7ce82699b3cac0
SHA197d624568a87f3806c0ccd8bb7c049db00d73fca
SHA2563310a01370496e555bc0e1c99bd322c444a7009be7f42a019abb03512468ea7b
SHA51248a9a54b9253f9e06716950c26d1005d4be9ac3621c9d49cc29c3db108ef81de1d2ee1abc7edfc2c108eb1cb103554ada553dff0c17019af3379aeadf54c0009