Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 01:28
Static task
static1
Behavioral task
behavioral1
Sample
4956a646aca0f57ca48cf10568510760.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4956a646aca0f57ca48cf10568510760.exe
Resource
win10v2004-20231215-en
General
-
Target
4956a646aca0f57ca48cf10568510760.exe
-
Size
385KB
-
MD5
4956a646aca0f57ca48cf10568510760
-
SHA1
b4fac926b24c5f3fdd5d32fdd1932276eaf0b78d
-
SHA256
31a638a281e4308919709295635ac13625e4721917026e3d2bac1d3ff57850a0
-
SHA512
c0a67f10eef3260c50fa1242353ccc7282940149c2b9181f61a89e9679cc9721b9f3a44d84717e4245ecc7aa8bfc25adff79f3c45a25408377b879b0afcde59f
-
SSDEEP
12288:rcxjoHHRB+sXg+slscd/LkmQy12RUC5oaLB:gxonRoDvd/ImQygRUaNB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1116 4956a646aca0f57ca48cf10568510760.exe -
Executes dropped EXE 1 IoCs
pid Process 1116 4956a646aca0f57ca48cf10568510760.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2708 4956a646aca0f57ca48cf10568510760.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2708 4956a646aca0f57ca48cf10568510760.exe 1116 4956a646aca0f57ca48cf10568510760.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1116 2708 4956a646aca0f57ca48cf10568510760.exe 89 PID 2708 wrote to memory of 1116 2708 4956a646aca0f57ca48cf10568510760.exe 89 PID 2708 wrote to memory of 1116 2708 4956a646aca0f57ca48cf10568510760.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4956a646aca0f57ca48cf10568510760.exe"C:\Users\Admin\AppData\Local\Temp\4956a646aca0f57ca48cf10568510760.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\4956a646aca0f57ca48cf10568510760.exeC:\Users\Admin\AppData\Local\Temp\4956a646aca0f57ca48cf10568510760.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d43b6fd6e44b3529e839222b9beba4f0
SHA137f7ba950e3ba9bb56767fd924dd0680797be027
SHA25625f6dbe57793a0d71ba68abf27f9f2ac1f10000b71a210fdc6c284f5f36f16e4
SHA512cc853d0ab031230d7b553d177e01088a9c4e2d6e2846cf15b25d48fce64d8b604514c7d212bfc6ecd91faccc60ccb4a4f6d48074343310abf5a39382a797a407