Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe
Resource
win10v2004-20240508-en
General
-
Target
c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe
-
Size
442KB
-
MD5
10cc97671d98b093f70da9616f927632
-
SHA1
df4c5d2f461ff4dbdb51528ceaa5aa7cce1373c6
-
SHA256
c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640
-
SHA512
8887ff79ce9d9fb1ed29787455eac04497b80d3c25e23b08d067273b7b1c8cb791dfdd800b94f889c0ffee2c8e7ec4b0a25b4a4a23c0d43cf8232840f25aa419
-
SSDEEP
12288:qX+JItW0Bpg3A+EFmDMLmo5/J1Ng8OBVUyfrJbzwvPkjkx05SL5+GzIEDpY0:K+W1S3A+EFmDMLmo5/J1Ng8OBVUyfrJA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe -
Executes dropped EXE 1 IoCs
pid Process 2768 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2768 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2768 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe 29 PID 2200 wrote to memory of 2768 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe 29 PID 2200 wrote to memory of 2768 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe 29 PID 2200 wrote to memory of 2768 2200 c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe"C:\Users\Admin\AppData\Local\Temp\c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exeC:\Users\Admin\AppData\Local\Temp\c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2768
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\c4929cd913be2cc622966ae903de447662662999c7970fdcc2cbe9a968e65640.exe
Filesize442KB
MD5aaa6527966538e60bd9562e92c10845f
SHA17d614e7db6e88354c28ae61cfe77f4bceeef7115
SHA25694b756e0a57826148f580dd7c5a27790c436738712766a7a655b8ac8596c1508
SHA512ee93f57547d705f41b1821e80e17670e85e3f85b2be11e4e9b121577f3344873bc3b1d910f53ffc4eea053c7d3c83ade82976fbda224a0b5c8276f8dc2c6c027