Analysis
-
max time kernel
229s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
51c8d4fff5fc076e55940419770cc716.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51c8d4fff5fc076e55940419770cc716.exe
Resource
win10v2004-20231215-en
General
-
Target
51c8d4fff5fc076e55940419770cc716.exe
-
Size
385KB
-
MD5
51c8d4fff5fc076e55940419770cc716
-
SHA1
781323d6348921654b76ad0ea8900ef4f32bb28d
-
SHA256
e864d1b355e7e16f10064ead158a72563baf391f7d321c11bf8dc2afa7ac1a20
-
SHA512
97c130e6408431617ce56c8b843e75889bcd310f6525fe84ab61e7fc4806d19aab67ddfe7f3465f01d1d8514b55756369802cff446698072bcdfbc6943079760
-
SSDEEP
12288:S5Hi/vKqSV3bS4iYBboU8T9obgGQSTzhUFDeIjKNHryI6iz0/3fSUSt+W+9V3yZV:S5HEK3VLS4iYBboU8T9obhnTzyFDeKAT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 656 51c8d4fff5fc076e55940419770cc716.exe -
Executes dropped EXE 1 IoCs
pid Process 656 51c8d4fff5fc076e55940419770cc716.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 51c8d4fff5fc076e55940419770cc716.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2552 51c8d4fff5fc076e55940419770cc716.exe 656 51c8d4fff5fc076e55940419770cc716.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 656 2552 51c8d4fff5fc076e55940419770cc716.exe 89 PID 2552 wrote to memory of 656 2552 51c8d4fff5fc076e55940419770cc716.exe 89 PID 2552 wrote to memory of 656 2552 51c8d4fff5fc076e55940419770cc716.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c8d4fff5fc076e55940419770cc716.exe"C:\Users\Admin\AppData\Local\Temp\51c8d4fff5fc076e55940419770cc716.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\51c8d4fff5fc076e55940419770cc716.exeC:\Users\Admin\AppData\Local\Temp\51c8d4fff5fc076e55940419770cc716.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD573a5d616c7f3f70ad595c1584a10c394
SHA1ca73d13bfa67259834a14c6f0181e1a9d1ddb9c5
SHA25649d6cf82b9e7a73442673a4b78f137404eb21d21b397c81d87100c577b373746
SHA51233bbda8ed25535cb8086089ee92207427ba785538301eac8f5cecbbdec3873c88a2e8cc52aca210a6efc09d72de74baeb7c2ef59e338e324ab20fb89accea36f