Analysis
-
max time kernel
147s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 20:11
Static task
static1
Behavioral task
behavioral1
Sample
100f5e90a9eb220b32e50b778c57c2dd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
100f5e90a9eb220b32e50b778c57c2dd.exe
Resource
win10v2004-20231215-en
General
-
Target
100f5e90a9eb220b32e50b778c57c2dd.exe
-
Size
771KB
-
MD5
100f5e90a9eb220b32e50b778c57c2dd
-
SHA1
b9d9c78e2b747f6fc869af1cfe41c0cddd74265e
-
SHA256
accb3a4a93d260cb167ebea88920f4a57c1164808e744b9e156a5b35f835b096
-
SHA512
d1af51a5e7ec2b200ba43a5d764f5658da4fbe9a7046c6d01e41e0ae40ed03245babaa8f4833af5c03aaecba218fc2385aa77c616bdedd9bc3f3899b8cc92ba9
-
SSDEEP
12288:w18myemDer514dJ0+Fpg5F9FK9vWb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:mNyDSr514H65aOb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3304 100f5e90a9eb220b32e50b778c57c2dd.exe -
Executes dropped EXE 1 IoCs
pid Process 3304 100f5e90a9eb220b32e50b778c57c2dd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4160 100f5e90a9eb220b32e50b778c57c2dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4160 100f5e90a9eb220b32e50b778c57c2dd.exe 3304 100f5e90a9eb220b32e50b778c57c2dd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3304 4160 100f5e90a9eb220b32e50b778c57c2dd.exe 20 PID 4160 wrote to memory of 3304 4160 100f5e90a9eb220b32e50b778c57c2dd.exe 20 PID 4160 wrote to memory of 3304 4160 100f5e90a9eb220b32e50b778c57c2dd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe"C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exeC:\Users\Admin\AppData\Local\Temp\100f5e90a9eb220b32e50b778c57c2dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD52470630a280b703285bb661d9c8b51b0
SHA11ab5c52eb3ee1a9c6e97d95934cadf33c6e19f1c
SHA256606fba8d32c5dba7941e625a25e60c0d46c8768ddf7fd4cb92f54d60e5102abb
SHA512d090c88515d532baa8216cc2a4eda32a1748e45285c51c33e81e873b8dbaa95e2ad97bc5b912e4d1e87ca02f036c65d74a575806af8b35ede3035a5d64dbdec4