Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 00:08
Static task
static1
Behavioral task
behavioral1
Sample
1bc7ed4ea76cd37bad3c6d7c9591256e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bc7ed4ea76cd37bad3c6d7c9591256e.exe
Resource
win10v2004-20231215-en
General
-
Target
1bc7ed4ea76cd37bad3c6d7c9591256e.exe
-
Size
385KB
-
MD5
1bc7ed4ea76cd37bad3c6d7c9591256e
-
SHA1
d569e7264a1ea228c86496b1a7d022ebb3f38d57
-
SHA256
bc579b7d772b61da46b15daa20dfc0e61916f1c9b11a342873df26855ac72b27
-
SHA512
a24b4bb5fd23a24afece44b517b9476dacc54f90e33dd23a4043348ae3003932479bca0d233c6651b655e2a1340412a646be9edc8593228f4f5a577aca3408df
-
SSDEEP
12288:d4EnV+6t2MpJafCdyl+nXq4TP5k1Io9Yx/wzB:dZnVhaKyl6/C1/9YxaB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1416 1bc7ed4ea76cd37bad3c6d7c9591256e.exe -
Executes dropped EXE 1 IoCs
pid Process 1416 1bc7ed4ea76cd37bad3c6d7c9591256e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4780 1bc7ed4ea76cd37bad3c6d7c9591256e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4780 1bc7ed4ea76cd37bad3c6d7c9591256e.exe 1416 1bc7ed4ea76cd37bad3c6d7c9591256e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1416 4780 1bc7ed4ea76cd37bad3c6d7c9591256e.exe 18 PID 4780 wrote to memory of 1416 4780 1bc7ed4ea76cd37bad3c6d7c9591256e.exe 18 PID 4780 wrote to memory of 1416 4780 1bc7ed4ea76cd37bad3c6d7c9591256e.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bc7ed4ea76cd37bad3c6d7c9591256e.exe"C:\Users\Admin\AppData\Local\Temp\1bc7ed4ea76cd37bad3c6d7c9591256e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\1bc7ed4ea76cd37bad3c6d7c9591256e.exeC:\Users\Admin\AppData\Local\Temp\1bc7ed4ea76cd37bad3c6d7c9591256e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5667b03676c931b0fd605fe51129f1771
SHA1abe1959e2675db5c4d46946eed0c90173a367429
SHA2568e4b978aa0d26cc39b70fd0dfb5a8e7de6b9150d3263e3785069fa29626cbba9
SHA51215e039a8336d85b1179d11fdd5d1a75119f8f463d782ca68fa7db2ffe3cabd0306c83338436f3abaf0a6d136ad52e8db9cae7ac55df8acce73c2edf65a7e65ee