Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
e04c28e28ec9f140c53278c33006b401.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e04c28e28ec9f140c53278c33006b401.exe
Resource
win10v2004-20231215-en
General
-
Target
e04c28e28ec9f140c53278c33006b401.exe
-
Size
82KB
-
MD5
e04c28e28ec9f140c53278c33006b401
-
SHA1
f3d811ed112c02718c877aa3d3efdf8f9e3c95c8
-
SHA256
2e39e192b195f4a2b4fb4796575e77a954bb609caae712fc91d34b8d27d4eda3
-
SHA512
4ab4f434f5ddbafff23ac27da149c9f16fbe1ab8a4a0d4cf25dfcfa33c664baea8561a926df3fbd15f53d378e02d0ab27d574c9dfb0aefb79467dbb876a78eb2
-
SSDEEP
1536:9ErgYAJNje7rSFGf2dRYGdN5Bd9BD4qQ1d44P41gPIYc3qAKpUWOQK3Qb2:9MgLC+FGwdN5Bd9BsqWNP726HpCQmM2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1332 e04c28e28ec9f140c53278c33006b401.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 e04c28e28ec9f140c53278c33006b401.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 e04c28e28ec9f140c53278c33006b401.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2040 e04c28e28ec9f140c53278c33006b401.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2040 e04c28e28ec9f140c53278c33006b401.exe 1332 e04c28e28ec9f140c53278c33006b401.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1332 2040 e04c28e28ec9f140c53278c33006b401.exe 29 PID 2040 wrote to memory of 1332 2040 e04c28e28ec9f140c53278c33006b401.exe 29 PID 2040 wrote to memory of 1332 2040 e04c28e28ec9f140c53278c33006b401.exe 29 PID 2040 wrote to memory of 1332 2040 e04c28e28ec9f140c53278c33006b401.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e04c28e28ec9f140c53278c33006b401.exe"C:\Users\Admin\AppData\Local\Temp\e04c28e28ec9f140c53278c33006b401.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\e04c28e28ec9f140c53278c33006b401.exeC:\Users\Admin\AppData\Local\Temp\e04c28e28ec9f140c53278c33006b401.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1332
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD534ed7a814d36143ae3443248e4443856
SHA1257a3dc8c11fe2e9969805953003a7807b5c2bd9
SHA2566e04c6b9440c95bb75a8d4fc86dac73874a8a281487763a6e51f9e27d8efb333
SHA51257e123c3a7fd349e1d6afa9142d3cd0ec3de1dd79913bb963d429df886164dd703da7a11a17272f3c69285da540cf40cfad66f224e848144ade9ea386aa89a52