Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
c59150375ab2e82d9bf186fc4c6a2780N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c59150375ab2e82d9bf186fc4c6a2780N.exe
Resource
win10v2004-20240709-en
General
-
Target
c59150375ab2e82d9bf186fc4c6a2780N.exe
-
Size
94KB
-
MD5
c59150375ab2e82d9bf186fc4c6a2780
-
SHA1
9df0395345ddb9349c0a24669ca4f13349c092e4
-
SHA256
93623c46fabc567a32c6556cf1f3329c646b7919e6b6b5d8481daf54f932780d
-
SHA512
a20bdf6a6b272cac9051715ea6778afe0aad743c47966f5b3ec1fe5a0bb44c3f8c0e62bad836a1849c3b0d3b247c67bbeee3e238a027f8ba5c988743101ed826
-
SSDEEP
1536:aCzZPDcNCYg8IEhVzOIARxL/TvCDOyLWJCoP7Z7C+w5WIALZdjsa:7zZLcYYg8IEhRRAvLL6Dt5yQ/5WJZRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4560 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Executes dropped EXE 1 IoCs
pid Process 4560 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2816 c59150375ab2e82d9bf186fc4c6a2780N.exe 4560 c59150375ab2e82d9bf186fc4c6a2780N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4560 2816 c59150375ab2e82d9bf186fc4c6a2780N.exe 85 PID 2816 wrote to memory of 4560 2816 c59150375ab2e82d9bf186fc4c6a2780N.exe 85 PID 2816 wrote to memory of 4560 2816 c59150375ab2e82d9bf186fc4c6a2780N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe"C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exeC:\Users\Admin\AppData\Local\Temp\c59150375ab2e82d9bf186fc4c6a2780N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD529b5d6ea0148946a7f728e37853c315b
SHA1136a3aaec263af425be5586a442cad642550d2ed
SHA256e1fa75d7684b9e7028d7592c4014fc77ca8218ff59f8fd640565ecd646488cf6
SHA5127925bd494aeba4ef38597d2b7dc929f6d335c6468697303f9cf3a9faf52cf7eb021fc92419a1614bda6bb6c378ff2f68a24f10c6f865a95e560ce06b9bd26787