Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 11:31
Static task
static1
Behavioral task
behavioral1
Sample
1b0457a173f04350152ab984e39b653c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b0457a173f04350152ab984e39b653c.exe
Resource
win10v2004-20231215-en
General
-
Target
1b0457a173f04350152ab984e39b653c.exe
-
Size
385KB
-
MD5
1b0457a173f04350152ab984e39b653c
-
SHA1
fc159a4982498266a38a4a0852f30c56616e77ea
-
SHA256
596e866491efb970766ac197749c0d6e3246413cb89b383a1b6a2a79c6c338c8
-
SHA512
f50e4844a255d3b731f8ec84e237b5b65fd984e3f4639f03d9510b9f30771189db00ae2cbc0a33b44e330051d1ad1f3f6444e302a71bf755cef1040348af6467
-
SSDEEP
12288:V5yaLiCld4C2IHSh/DBI9I2RO07iyKqRlCkBBcB:nNeQdF2nDy9hRO0GMHUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 388 1b0457a173f04350152ab984e39b653c.exe -
Executes dropped EXE 1 IoCs
pid Process 388 1b0457a173f04350152ab984e39b653c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4364 1b0457a173f04350152ab984e39b653c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4364 1b0457a173f04350152ab984e39b653c.exe 388 1b0457a173f04350152ab984e39b653c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 388 4364 1b0457a173f04350152ab984e39b653c.exe 91 PID 4364 wrote to memory of 388 4364 1b0457a173f04350152ab984e39b653c.exe 91 PID 4364 wrote to memory of 388 4364 1b0457a173f04350152ab984e39b653c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe"C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exeC:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f80d68565b9117dcd9ae21ccfaa7d31a
SHA18c090b1be0f512b34962d507dbce1987ca4f230f
SHA256923b97f23ab002751c8da5426e0d0d0c0a362913e57f9e36c461bed26c651684
SHA5128763f7aca13017bc10ac7296d4f81a48fc214de253d0f606eff951e6ab3cc620ea22c4f771cb350ef1f3b148ca0cebc0738b00defca614cafd8ac5bc00816482