Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
0f5892f93c0b7ecc2f50a45ecd947119.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f5892f93c0b7ecc2f50a45ecd947119.exe
Resource
win10v2004-20231215-en
General
-
Target
0f5892f93c0b7ecc2f50a45ecd947119.exe
-
Size
385KB
-
MD5
0f5892f93c0b7ecc2f50a45ecd947119
-
SHA1
cd9d8d8739310c0e36164b7694a22f124aff6a3c
-
SHA256
ee486bee3bc23af4f8f44e886ce016b8d3cc1af33799567008736292d3f4a2b2
-
SHA512
038790131d904f9ff8c950b56e79ea4e098f192d46210c81ffbe79192bc36147f2de31bc0820af0bdb3ae5097fa4c69f9e7d4164b3133c8e954e092bee07c63c
-
SSDEEP
12288:pW+HIRFTET2rm5ucP2DbA5qSuA9IM5npnB:pnoXS2ri5PoApuSn5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1404 0f5892f93c0b7ecc2f50a45ecd947119.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 0f5892f93c0b7ecc2f50a45ecd947119.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 0f5892f93c0b7ecc2f50a45ecd947119.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4864 0f5892f93c0b7ecc2f50a45ecd947119.exe 1404 0f5892f93c0b7ecc2f50a45ecd947119.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1404 4864 0f5892f93c0b7ecc2f50a45ecd947119.exe 24 PID 4864 wrote to memory of 1404 4864 0f5892f93c0b7ecc2f50a45ecd947119.exe 24 PID 4864 wrote to memory of 1404 4864 0f5892f93c0b7ecc2f50a45ecd947119.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5892f93c0b7ecc2f50a45ecd947119.exe"C:\Users\Admin\AppData\Local\Temp\0f5892f93c0b7ecc2f50a45ecd947119.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\0f5892f93c0b7ecc2f50a45ecd947119.exeC:\Users\Admin\AppData\Local\Temp\0f5892f93c0b7ecc2f50a45ecd947119.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5f70a3d47b791c96a7984c42cf6ca7997
SHA1511f8813e6dd6d07e7e3f28bba1742f90b460117
SHA256ea7ea1db423f266a09014868e8cb88b4282c37cef53a8dad0bad1b1cd023f822
SHA512ea08668e67d5bdf021480fc107ceb54f2536ce2caa8d5f4ac55faf90e6cd56a733ce64d2ebbefe2e1f446be65eb9be1a09c53216820489fcffa83cb3fc57fcd3