Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 14:58
Static task
static1
Behavioral task
behavioral1
Sample
7759742467c46bb0c3f04880472cc790.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7759742467c46bb0c3f04880472cc790.exe
Resource
win10v2004-20231215-en
General
-
Target
7759742467c46bb0c3f04880472cc790.exe
-
Size
385KB
-
MD5
7759742467c46bb0c3f04880472cc790
-
SHA1
098cfe5e4e05ae881655e2b702f26099442abe31
-
SHA256
f37ce569e01b61b9e84699555122b4fbc5ddc42f7b3d1ff37db5cf6b4b1c8a34
-
SHA512
e57eadb60f04fc3022b7e72843e0c74e67af42345a9ca6f07820c4a13d080ae5925998e8d735b08352cd4a9610e45eb087c44042fcf4ec3e4848fcada3c6606e
-
SSDEEP
6144:53wUEbekJOYWs0cj1QpJ5r2qMFU2aGiCaAORIS4oGe2EXUB:2bekhWszj1aY/BORAo/tXUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4500 7759742467c46bb0c3f04880472cc790.exe -
Executes dropped EXE 1 IoCs
pid Process 4500 7759742467c46bb0c3f04880472cc790.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1824 7759742467c46bb0c3f04880472cc790.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1824 7759742467c46bb0c3f04880472cc790.exe 4500 7759742467c46bb0c3f04880472cc790.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4500 1824 7759742467c46bb0c3f04880472cc790.exe 29 PID 1824 wrote to memory of 4500 1824 7759742467c46bb0c3f04880472cc790.exe 29 PID 1824 wrote to memory of 4500 1824 7759742467c46bb0c3f04880472cc790.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7759742467c46bb0c3f04880472cc790.exe"C:\Users\Admin\AppData\Local\Temp\7759742467c46bb0c3f04880472cc790.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\7759742467c46bb0c3f04880472cc790.exeC:\Users\Admin\AppData\Local\Temp\7759742467c46bb0c3f04880472cc790.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD531ae090aed040f4ecad02f383ac7ff97
SHA1e1a4ba874b12820ee5ce1033849aa1ca88bdd969
SHA256447a1a50e651fabf2cd07b81f2079adc643c302bd235eab917054edb5aa22131
SHA5120bb1e2a73cd453388b0fea0b5020b86fa4f5802e99a46c263fde0189cd90e6ed427ed7984a78f591c417488d81f31053ad5b8bfba2ee22dc9109984f7b3e0112