Analysis
-
max time kernel
137s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
6f77bdca61704948df6bcaa367e33baf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f77bdca61704948df6bcaa367e33baf.exe
Resource
win10v2004-20231215-en
General
-
Target
6f77bdca61704948df6bcaa367e33baf.exe
-
Size
385KB
-
MD5
6f77bdca61704948df6bcaa367e33baf
-
SHA1
d0bc6014626f0e510f97b8447fdd67eee8972470
-
SHA256
b311eadfb76f1192b92ca9127a2f1eb4317332192881546ecbb8917ed33c70fe
-
SHA512
3d16de8c14a0e6f3f452ccf5d1f3cd83000762d11ec03f1f7f8368ca3b38d106869a348612945d1018f0725b2b941dd5e7b25e7d4356236aae4a0f847125b7a6
-
SSDEEP
6144:Um72kRPaQqcbzDCI/xfsnaRAg5sv98Ukzh9Hor9rafNB:ukNDC+fQaWg5UnkzXeraVB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 720 6f77bdca61704948df6bcaa367e33baf.exe -
Executes dropped EXE 1 IoCs
pid Process 720 6f77bdca61704948df6bcaa367e33baf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4768 6f77bdca61704948df6bcaa367e33baf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4768 6f77bdca61704948df6bcaa367e33baf.exe 720 6f77bdca61704948df6bcaa367e33baf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 720 4768 6f77bdca61704948df6bcaa367e33baf.exe 90 PID 4768 wrote to memory of 720 4768 6f77bdca61704948df6bcaa367e33baf.exe 90 PID 4768 wrote to memory of 720 4768 6f77bdca61704948df6bcaa367e33baf.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe"C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exeC:\Users\Admin\AppData\Local\Temp\6f77bdca61704948df6bcaa367e33baf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56b48e1506548a443e3c0e791bdd8af3b
SHA1b44a8901bdcd780b5fc9c5b7cb0c2881359d7743
SHA256a8c9e302595a867c038fa9134c0510f00797c1676d062535a9591d96c792afbf
SHA5122f3ac2441fb7e92d886aadd14073e1a56fa93568c3ce5fe5cbd865873255c9178f1a72f2df74d6b6401816c420eb10656325f622f0fd3cf911739af0db44eb5a