Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 02:31
Static task
static1
Behavioral task
behavioral1
Sample
001733a447ec623cc5892292cd6ee5c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
001733a447ec623cc5892292cd6ee5c6.exe
Resource
win10v2004-20231215-en
General
-
Target
001733a447ec623cc5892292cd6ee5c6.exe
-
Size
385KB
-
MD5
001733a447ec623cc5892292cd6ee5c6
-
SHA1
d133445019863083a7faf57d395ea2d0e0af9589
-
SHA256
7a8a084e841b0e5f376cdf9e7c7143ea1c08fd51d5327bcaa676e050ff647de8
-
SHA512
9fe843f60663b0ff6bee82bd948e700b7c0bf9f5de9067304694b996356625d72aabf16dd0fe2ffb916e21a6e64f0840af32c15483da6113254d790211be90bd
-
SSDEEP
6144:7TkGwNfyc3CSNxWuWKISDq8iNs71o+v8WtU+qD1ifHjyJk9eQftw7veV0B:7TSlyGr8u/FD36sDv8V+PvxQQ0xB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4852 001733a447ec623cc5892292cd6ee5c6.exe -
Executes dropped EXE 1 IoCs
pid Process 4852 001733a447ec623cc5892292cd6ee5c6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4672 001733a447ec623cc5892292cd6ee5c6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4672 001733a447ec623cc5892292cd6ee5c6.exe 4852 001733a447ec623cc5892292cd6ee5c6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4852 4672 001733a447ec623cc5892292cd6ee5c6.exe 89 PID 4672 wrote to memory of 4852 4672 001733a447ec623cc5892292cd6ee5c6.exe 89 PID 4672 wrote to memory of 4852 4672 001733a447ec623cc5892292cd6ee5c6.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe"C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exeC:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5984dcc7068c295660dcef7de61b2ce15
SHA1ba2085cc3e83f7aae363f9d4c58619c40e474022
SHA256f39d87c49e497c54e49e4705a04b77946c9db2852833ccf46fb3883a56cba141
SHA512c568ff5407c889ff111d8a7689cd8cf6d019d4b5399ce27e052eebb9f16db40e6fbdf2958312f370beca7edd92176feb79d363886d0c33c00a30cb01fa1403f4