Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 10:04
Static task
static1
Behavioral task
behavioral1
Sample
65cf4d9b8942262c739ac51a15afd5e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65cf4d9b8942262c739ac51a15afd5e2.exe
Resource
win10v2004-20231215-en
General
-
Target
65cf4d9b8942262c739ac51a15afd5e2.exe
-
Size
907KB
-
MD5
65cf4d9b8942262c739ac51a15afd5e2
-
SHA1
f6a42e9c42f66de210cd1c05d29da76d7d88ce5f
-
SHA256
2b081e543491e3dacd3ee3b823ab485a6ee7d0b5ea1f272a1755ca7b104ec4ad
-
SHA512
c0b7f47c9140a99189e7b94ac221fb4ed996cf9aa62b4a13c2323905a12288c65b1e5448de3e8405ccbe4ad445bad6168d55e5723230e8f4b7da97553e63710a
-
SSDEEP
12288:QPs8l6E8n913mJMpeQrpz9eGNaK7W4xsOjpNIr3Q1xyIkjVDa/ZS1:QE8kKMp3p5eWWjOjbQQoa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1120 65cf4d9b8942262c739ac51a15afd5e2.exe -
Executes dropped EXE 1 IoCs
pid Process 1120 65cf4d9b8942262c739ac51a15afd5e2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1304 65cf4d9b8942262c739ac51a15afd5e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1304 65cf4d9b8942262c739ac51a15afd5e2.exe 1120 65cf4d9b8942262c739ac51a15afd5e2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1120 1304 65cf4d9b8942262c739ac51a15afd5e2.exe 93 PID 1304 wrote to memory of 1120 1304 65cf4d9b8942262c739ac51a15afd5e2.exe 93 PID 1304 wrote to memory of 1120 1304 65cf4d9b8942262c739ac51a15afd5e2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe"C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exeC:\Users\Admin\AppData\Local\Temp\65cf4d9b8942262c739ac51a15afd5e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD55ed58a163177641cbc1a87f69c6dfbbe
SHA1767cc8439a68e1b0427fe3286601f31909835358
SHA256ac445d4988d32482bd3a5d77a31b367f2c39be18708feb37f354b261afc9ea07
SHA512009d3e694bc823719481ba67495e05d8d4342680a2c5868739bdb4549698883f09d7fae19e641bf2c5df0dcbd127066cc66d3733e005a804cc666ef9a3ab4b96