Analysis
-
max time kernel
14s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
6c1ee2f9783881d26c69843c77e0ff22.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c1ee2f9783881d26c69843c77e0ff22.exe
Resource
win10v2004-20231215-en
General
-
Target
6c1ee2f9783881d26c69843c77e0ff22.exe
-
Size
907KB
-
MD5
6c1ee2f9783881d26c69843c77e0ff22
-
SHA1
8afca03802cc7f9fa5b13578f6055d19fa35ebce
-
SHA256
8ddbdf90c22bb7e7760c5d23616ee41e7b64a4a2be04ef9465f52bd5787309ec
-
SHA512
d6f47b9e4a59e2e97b06435c1ce71a4e13dab1ad92515a207d1760519439801aed93e833e64feb669eb86e03c41d2a5089e070eeabe937d3e2abea8c3d9a4cc2
-
SSDEEP
24576:pEzwFwdQc+pLSNhoJoJfbM+nyE3eJElgszjaoma/ZS1:WzjQc+wNh4oJDM+nmegs/aZgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 6c1ee2f9783881d26c69843c77e0ff22.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 6c1ee2f9783881d26c69843c77e0ff22.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 6c1ee2f9783881d26c69843c77e0ff22.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 6c1ee2f9783881d26c69843c77e0ff22.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2080 6c1ee2f9783881d26c69843c77e0ff22.exe 2840 6c1ee2f9783881d26c69843c77e0ff22.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2840 2080 6c1ee2f9783881d26c69843c77e0ff22.exe 17 PID 2080 wrote to memory of 2840 2080 6c1ee2f9783881d26c69843c77e0ff22.exe 17 PID 2080 wrote to memory of 2840 2080 6c1ee2f9783881d26c69843c77e0ff22.exe 17 PID 2080 wrote to memory of 2840 2080 6c1ee2f9783881d26c69843c77e0ff22.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1ee2f9783881d26c69843c77e0ff22.exe"C:\Users\Admin\AppData\Local\Temp\6c1ee2f9783881d26c69843c77e0ff22.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\6c1ee2f9783881d26c69843c77e0ff22.exeC:\Users\Admin\AppData\Local\Temp\6c1ee2f9783881d26c69843c77e0ff22.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5118fd8f5d5f241c7d285d510ee08b01c
SHA15a33d44ef8839931ee7602f6e1714af66f97b112
SHA256acc032e028a524c5cc252d62c8759ad1717f4d8db12dcebfe5414fbe40599355
SHA5127cb493f081816cdafe7ab95b6f0ac97b11510a77850f6c638b7f03bc2b0ea0d3c3b7332bdc86cf5385567d8eec709757d8426ce4d2a13b4e788d1e0da2dd86e2