Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
6f77bdca61704948df6bcaa367e33baf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f77bdca61704948df6bcaa367e33baf.exe
Resource
win10v2004-20231215-en
General
-
Target
6f77bdca61704948df6bcaa367e33baf.exe
-
Size
385KB
-
MD5
6f77bdca61704948df6bcaa367e33baf
-
SHA1
d0bc6014626f0e510f97b8447fdd67eee8972470
-
SHA256
b311eadfb76f1192b92ca9127a2f1eb4317332192881546ecbb8917ed33c70fe
-
SHA512
3d16de8c14a0e6f3f452ccf5d1f3cd83000762d11ec03f1f7f8368ca3b38d106869a348612945d1018f0725b2b941dd5e7b25e7d4356236aae4a0f847125b7a6
-
SSDEEP
6144:Um72kRPaQqcbzDCI/xfsnaRAg5sv98Ukzh9Hor9rafNB:ukNDC+fQaWg5UnkzXeraVB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 6f77bdca61704948df6bcaa367e33baf.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 6f77bdca61704948df6bcaa367e33baf.exe -
Loads dropped DLL 1 IoCs
pid Process 1476 6f77bdca61704948df6bcaa367e33baf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1476 6f77bdca61704948df6bcaa367e33baf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1476 6f77bdca61704948df6bcaa367e33baf.exe 2988 6f77bdca61704948df6bcaa367e33baf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2988 1476 6f77bdca61704948df6bcaa367e33baf.exe 28 PID 1476 wrote to memory of 2988 1476 6f77bdca61704948df6bcaa367e33baf.exe 28 PID 1476 wrote to memory of 2988 1476 6f77bdca61704948df6bcaa367e33baf.exe 28 PID 1476 wrote to memory of 2988 1476 6f77bdca61704948df6bcaa367e33baf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe"C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exeC:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58d5ec6a788c458d7c389ee1b1e1410b4
SHA1c71d6649b7002b0a963ef9fbe18dfb941dd531ee
SHA256fa25f8781545a8ffffc467638988dcf80ea2da8acd704b3ae3f88cff48d68201
SHA51242f1abf9f1be0f63c2912ad1ac1c6f9cca215d38859afc3de8b64f751aa638ab8e2bb2864d3ed2a59b6b85a409772bdd2672231994172cf65499e3b8e5d0c0ca