Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
df6cad8163fa73b93e27fb6929498dbf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
df6cad8163fa73b93e27fb6929498dbf.exe
Resource
win10v2004-20240226-en
General
-
Target
df6cad8163fa73b93e27fb6929498dbf.exe
-
Size
6.5MB
-
MD5
df6cad8163fa73b93e27fb6929498dbf
-
SHA1
c5a344c87b24d175e9af990566765bfa6a004e3e
-
SHA256
fc07b8d433cff92b5789b3691302f0cff4cc80cf84887860656159aacd83cf04
-
SHA512
ca46e4fd92c67c5b016e5f097d033400e64c5317e7b9d114957a017784e9ff3994a8c4c1e73fe97268ef890bf12094545d7b66ff8c1809149a5b62709c398ded
-
SSDEEP
98304:992r9db/Brr2aVm2VG7CJLuM1Fg2R5xR43JOZqEKhV2aVm2VG7CJLuM1Fg2O:I7prrXVmdCJ1g+xR44cEKTXVmdCJ1gr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1532 df6cad8163fa73b93e27fb6929498dbf.exe -
Executes dropped EXE 1 IoCs
pid Process 1532 df6cad8163fa73b93e27fb6929498dbf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3768 df6cad8163fa73b93e27fb6929498dbf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3768 df6cad8163fa73b93e27fb6929498dbf.exe 1532 df6cad8163fa73b93e27fb6929498dbf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1532 3768 df6cad8163fa73b93e27fb6929498dbf.exe 91 PID 3768 wrote to memory of 1532 3768 df6cad8163fa73b93e27fb6929498dbf.exe 91 PID 3768 wrote to memory of 1532 3768 df6cad8163fa73b93e27fb6929498dbf.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\df6cad8163fa73b93e27fb6929498dbf.exe"C:\Users\Admin\AppData\Local\Temp\df6cad8163fa73b93e27fb6929498dbf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\df6cad8163fa73b93e27fb6929498dbf.exeC:\Users\Admin\AppData\Local\Temp\df6cad8163fa73b93e27fb6929498dbf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1532
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b357cd4b9a42383596f72150ca6e8ee3
SHA1d11e73bbc11548a7b01e78687366980ad5b77348
SHA25609f6750dc946c957a6ff67e03b43fd4524ebdf81f021cab1186117336771185b
SHA5124f3f6111bca51f2547ff8eefd2e70684c67824e11f4825079a7ccc6f8cc46b91ac9470f2262e686a874b9deefe711dbd0bee63ce560dec2cb85cdee950b09680