Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
1fdc45824461d23cfa70c414b90cb930.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1fdc45824461d23cfa70c414b90cb930.exe
Resource
win10v2004-20231215-en
General
-
Target
1fdc45824461d23cfa70c414b90cb930.exe
-
Size
385KB
-
MD5
1fdc45824461d23cfa70c414b90cb930
-
SHA1
067365fc10084bb08288b43de17bbef1927f3d81
-
SHA256
409944ac79553cd7daf1b55263800e7ad0a0cd956470a312c7162d4a3b0a4d2f
-
SHA512
7c12e664db4d79e34356ad338814cf20b48d0be42a5416acee9e60f1b70dd87767bd6873a01c34beabef1e8947a7696747073ef5812405b3c3076866d5270356
-
SSDEEP
12288:gxpaColpUi/LVWLLG2zLOhKjazLbPt6wB+gtzMD/0B:gxfolKiz4XkDl6wB+gtzMz0B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4612 1fdc45824461d23cfa70c414b90cb930.exe -
Executes dropped EXE 1 IoCs
pid Process 4612 1fdc45824461d23cfa70c414b90cb930.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4648 1fdc45824461d23cfa70c414b90cb930.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4648 1fdc45824461d23cfa70c414b90cb930.exe 4612 1fdc45824461d23cfa70c414b90cb930.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4612 4648 1fdc45824461d23cfa70c414b90cb930.exe 91 PID 4648 wrote to memory of 4612 4648 1fdc45824461d23cfa70c414b90cb930.exe 91 PID 4648 wrote to memory of 4612 4648 1fdc45824461d23cfa70c414b90cb930.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe"C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exeC:\Users\Admin\AppData\Local\Temp\1fdc45824461d23cfa70c414b90cb930.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD58f064840e8ccdd226ea863dc50e7d805
SHA1b226837ee43851f6874969f4b9a2846415ccb2ad
SHA256191b9b42e90ed2a24a92c3066327afaf630e75232f9e7d92c5b80ac858dc456b
SHA512d72b5f6b2dbe9659911b347fb73360c431bfadd924f9610f95c375c26dcce98516081fb5b6ba73f6cb9d5076d62cd8c04d1c17c758b1373dc629f6db973fdff9