Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
Resource
win10v2004-20240709-en
General
-
Target
33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
-
Size
192KB
-
MD5
0293381e57203dcf3f9e87f08e9edcfa
-
SHA1
80bf3adafe275b4dda7fb67d9d9fefbf8f8e84e2
-
SHA256
33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850
-
SHA512
dd844e56cc50dbb22523a3a87162e364cb367a0d13e24912e1a4bf6e720b63093077bb4872bc5121970732fe01e59f1cd271d8e0fa9d52b1a73ca83791fd228f
-
SSDEEP
3072:+8ONq+5yRoOZUOPa7NqDOcN7bmGGGvwGcLekTXHIOdb/HRU5ZPcRnYcsqmAPT0qB:+LNq+AWFKSsicxtGnnS2hAqKub4w
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1320 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1320 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1320 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe 30 PID 2256 wrote to memory of 1320 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe 30 PID 2256 wrote to memory of 1320 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe 30 PID 2256 wrote to memory of 1320 2256 33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe"C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exeC:\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\33de60cc86c39e873616e6a3d3864dee2e4ca9af953e0a312b17bcc1f240a850.exe
Filesize192KB
MD5f6d444b069003c68738c79959a91ddbd
SHA157c20bdc36e8ebf13659a64cb49d0817ca0328c0
SHA2562427d2c23c8ec6b1a11dced890f5a9272549aaf8a212e9ffa56d5ae8fb1abc79
SHA512dd4fdebbf5efc2b62eb5ab025513f3fd4e01b3511aefd30b5e03ea6306f68369f7ff3e403d90d90c42d9c53fc188a2325e43407a7cbcb63e57212b39e247aeba