Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
c59150375ab2e82d9bf186fc4c6a2780N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c59150375ab2e82d9bf186fc4c6a2780N.exe
Resource
win10v2004-20240709-en
General
-
Target
c59150375ab2e82d9bf186fc4c6a2780N.exe
-
Size
94KB
-
MD5
c59150375ab2e82d9bf186fc4c6a2780
-
SHA1
9df0395345ddb9349c0a24669ca4f13349c092e4
-
SHA256
93623c46fabc567a32c6556cf1f3329c646b7919e6b6b5d8481daf54f932780d
-
SHA512
a20bdf6a6b272cac9051715ea6778afe0aad743c47966f5b3ec1fe5a0bb44c3f8c0e62bad836a1849c3b0d3b247c67bbeee3e238a027f8ba5c988743101ed826
-
SSDEEP
1536:aCzZPDcNCYg8IEhVzOIARxL/TvCDOyLWJCoP7Z7C+w5WIALZdjsa:7zZLcYYg8IEhRRAvLL6Dt5yQ/5WJZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Executes dropped EXE 1 IoCs
pid Process 2764 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe 2764 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2764 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe 31 PID 1984 wrote to memory of 2764 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe 31 PID 1984 wrote to memory of 2764 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe 31 PID 1984 wrote to memory of 2764 1984 c59150375ab2e82d9bf186fc4c6a2780N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe"C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exeC:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5aa6f0b0a4525a658152a3ce4f6fa8091
SHA1f777971e2f43590a5a66e50144bdf435e0efffb1
SHA256c43e66a376b69eec444e94a51ac0c35d9b8c7be81b601756aa26db79736f9e26
SHA512cc5d5f59a7253ee65c9a74b6dedad3b17faa34c2ff5b8681dd37b457ef3cf7bd2c5f458c5de9b32e2ed31bc426e1c029a1f48055fdbc9428215cdae6cf606cd4