Analysis
-
max time kernel
145s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
01b9a16f1ffca0ebd25583858e65e9a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01b9a16f1ffca0ebd25583858e65e9a7.exe
Resource
win10v2004-20231215-en
General
-
Target
01b9a16f1ffca0ebd25583858e65e9a7.exe
-
Size
771KB
-
MD5
01b9a16f1ffca0ebd25583858e65e9a7
-
SHA1
ea1330b7802f7da539d65dd19f36ae6745fb242c
-
SHA256
249e86c4e0fa85a618353c5ce81bf6bba9b7237419a5a99575a947e4ffaea5ad
-
SHA512
0dc152d0c3122904b4a34109f2c1d2155ab12c2dcf5961b2a8eb4f6d2bd60c97df68a28c2460020e739beba8632f6c6b043d53bdfa5a0bad49af01dff9e30d44
-
SSDEEP
12288:yzINvMGcfleCpqPs03JmyQS4+y63/ub10VHmDXTuFaa2AtyGTKOF25ZoJJyhRgeG:yzINvMNECpf+TCb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1008 01b9a16f1ffca0ebd25583858e65e9a7.exe -
Executes dropped EXE 1 IoCs
pid Process 1008 01b9a16f1ffca0ebd25583858e65e9a7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 01b9a16f1ffca0ebd25583858e65e9a7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4408 01b9a16f1ffca0ebd25583858e65e9a7.exe 1008 01b9a16f1ffca0ebd25583858e65e9a7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 1008 4408 01b9a16f1ffca0ebd25583858e65e9a7.exe 42 PID 4408 wrote to memory of 1008 4408 01b9a16f1ffca0ebd25583858e65e9a7.exe 42 PID 4408 wrote to memory of 1008 4408 01b9a16f1ffca0ebd25583858e65e9a7.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\01b9a16f1ffca0ebd25583858e65e9a7.exe"C:\Users\Admin\AppData\Local\Temp\01b9a16f1ffca0ebd25583858e65e9a7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\01b9a16f1ffca0ebd25583858e65e9a7.exeC:\Users\Admin\AppData\Local\Temp\01b9a16f1ffca0ebd25583858e65e9a7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5169d8b468676d401f5e708b671e92eff
SHA10a59868302a429526de0754613e2f48b0862a801
SHA256ca526d7debf3767d6b9def6dbb54a569c12e317bbe3ae127be5b0814dee3eb6a
SHA512d6f9f10b2fce64ac99004bbf8f99988381ffb9058a138910d12569fffdab535318ac8dc2efb91bb5a5fab4f45165cc617e82e412afad6be36b517ee0cb25fd29