Analysis
-
max time kernel
145s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 05:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08e1c635597f27a0dbff1e597817eeb6.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
08e1c635597f27a0dbff1e597817eeb6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
08e1c635597f27a0dbff1e597817eeb6.exe
-
Size
771KB
-
MD5
08e1c635597f27a0dbff1e597817eeb6
-
SHA1
ed0540aaecc304abd633b0648658c69834ac2e41
-
SHA256
bba320e2a5afe2eaffd524c6a78da76b8ea04411184aa27ff9e9ec73f7d8a8c6
-
SHA512
db8c1d4d4c95d0ff9afc99a5ba3c2d70d77b413eff60c9e334e821a00331c0e4940aa034562d26caef89e76ed4f6f7e36b8fa3f7fa85562cabecc0462d629871
-
SSDEEP
24576:n8cpoMs2omPh+P9yKVb10hJaothZ2/T6FBBB:n86NomPhQhZ/ofT
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5028 08e1c635597f27a0dbff1e597817eeb6.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 08e1c635597f27a0dbff1e597817eeb6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3408 08e1c635597f27a0dbff1e597817eeb6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3408 08e1c635597f27a0dbff1e597817eeb6.exe 5028 08e1c635597f27a0dbff1e597817eeb6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3408 wrote to memory of 5028 3408 08e1c635597f27a0dbff1e597817eeb6.exe 18 PID 3408 wrote to memory of 5028 3408 08e1c635597f27a0dbff1e597817eeb6.exe 18 PID 3408 wrote to memory of 5028 3408 08e1c635597f27a0dbff1e597817eeb6.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e1c635597f27a0dbff1e597817eeb6.exe"C:\Users\Admin\AppData\Local\Temp\08e1c635597f27a0dbff1e597817eeb6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\08e1c635597f27a0dbff1e597817eeb6.exeC:\Users\Admin\AppData\Local\Temp\08e1c635597f27a0dbff1e597817eeb6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5028
-