Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe
Resource
win10v2004-20240426-en
General
-
Target
c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe
-
Size
428KB
-
MD5
ee3688b0ac30c5fc3425b9f829475d48
-
SHA1
5e11078d4d75578a919b7b0fc4394ac33b9cb758
-
SHA256
c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259
-
SHA512
0fc5d52ee32e98683885679ef65c7cac341b018c4f285a9720b4ea079cdcdcdffb36a02315fbadecee933bb2bd81c9a0f0ec1af00f54fbca10466241f8563bac
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF4O8SPkO7GgZw5BaiTXBNlTil/YHdtqHR:gZLolhNVyEq866g2HNBTTMA3qHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1256 CAE.tmp -
Executes dropped EXE 1 IoCs
pid Process 1256 CAE.tmp -
Loads dropped DLL 1 IoCs
pid Process 2388 c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1256 2388 c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe 28 PID 2388 wrote to memory of 1256 2388 c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe 28 PID 2388 wrote to memory of 1256 2388 c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe 28 PID 2388 wrote to memory of 1256 2388 c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe"C:\Users\Admin\AppData\Local\Temp\c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\CAE.tmp"C:\Users\Admin\AppData\Local\Temp\CAE.tmp" --pingC:\Users\Admin\AppData\Local\Temp\c2e1536c31657da911ceced78e9e277367089ccb8929dcd486b9bd71116cf259.exe 1819CCF0D4DAFAE18963555BC3A91CB107898D3C3459FB42202039FE955BDE76AC2F38A7E37A2320A340807D1F922D4A99AAD3151FF7DE0C89211CD642F47B332⤵
- Deletes itself
- Executes dropped EXE
PID:1256
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5daba33f3c9e823933b3075b11b96d082
SHA1a0ab81aba037a2e060d5c56d6e45ddef218bc394
SHA25682093de1cba268344271df1cd826eb6f41bb447f5c1c7b22cdf218987b326ea0
SHA512bd4a75bb90018b256f858babb1aa78d8a18f862a0c82ac839ff1728ee1af22a0391fc4b4ab18e2e0aac4fb421562bafc5d48c72268d9ba473a151d86a4c592d5