Analysis

  • max time kernel
    157s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 11:31

General

  • Target

    1b0457a173f04350152ab984e39b653c.exe

  • Size

    385KB

  • MD5

    1b0457a173f04350152ab984e39b653c

  • SHA1

    fc159a4982498266a38a4a0852f30c56616e77ea

  • SHA256

    596e866491efb970766ac197749c0d6e3246413cb89b383a1b6a2a79c6c338c8

  • SHA512

    f50e4844a255d3b731f8ec84e237b5b65fd984e3f4639f03d9510b9f30771189db00ae2cbc0a33b44e330051d1ad1f3f6444e302a71bf755cef1040348af6467

  • SSDEEP

    12288:V5yaLiCld4C2IHSh/DBI9I2RO07iyKqRlCkBBcB:nNeQdF2nDy9hRO0GMHUB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe
    "C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe
      C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1b0457a173f04350152ab984e39b653c.exe

    Filesize

    385KB

    MD5

    f80d68565b9117dcd9ae21ccfaa7d31a

    SHA1

    8c090b1be0f512b34962d507dbce1987ca4f230f

    SHA256

    923b97f23ab002751c8da5426e0d0d0c0a362913e57f9e36c461bed26c651684

    SHA512

    8763f7aca13017bc10ac7296d4f81a48fc214de253d0f606eff951e6ab3cc620ea22c4f771cb350ef1f3b148ca0cebc0738b00defca614cafd8ac5bc00816482

  • memory/388-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/388-14-0x0000000000160000-0x00000000001C6000-memory.dmp

    Filesize

    408KB

  • memory/388-20-0x0000000004EA0000-0x0000000004EFF000-memory.dmp

    Filesize

    380KB

  • memory/388-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/388-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/388-35-0x000000000C640000-0x000000000C67C000-memory.dmp

    Filesize

    240KB

  • memory/388-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4364-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4364-1-0x0000000000160000-0x00000000001C6000-memory.dmp

    Filesize

    408KB

  • memory/4364-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4364-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB