Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
7cede8dcc9a492af7f11d54c94a0c4fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cede8dcc9a492af7f11d54c94a0c4fb.exe
Resource
win10v2004-20231215-en
General
-
Target
7cede8dcc9a492af7f11d54c94a0c4fb.exe
-
Size
385KB
-
MD5
7cede8dcc9a492af7f11d54c94a0c4fb
-
SHA1
f1a7ac54cd130860e8d41d805f6b9c1fd5051993
-
SHA256
bb98df2d744ae2eee11980250629b3b8029e55e85df039c6dde2fa6b76ae07b1
-
SHA512
ba09453957512a3a9733a37eef8821eb32bb0bf660c19d192a7a1aca501994f252cf4483974ce66949024926915e88b39a721bd99a9bcef9eff4a03c8501f258
-
SSDEEP
6144:hrxH3/KhZ1Z/uOEdhIhH1Ktkq5LjNFYv6FiZzlp8bFWIQ76vw5nA1RL8d+HLrlB:hxXyhZf/uJ8VKy20uiZx6An4B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2452 7cede8dcc9a492af7f11d54c94a0c4fb.exe -
Executes dropped EXE 1 IoCs
pid Process 2452 7cede8dcc9a492af7f11d54c94a0c4fb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1836 7cede8dcc9a492af7f11d54c94a0c4fb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 7cede8dcc9a492af7f11d54c94a0c4fb.exe 2452 7cede8dcc9a492af7f11d54c94a0c4fb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2452 1836 7cede8dcc9a492af7f11d54c94a0c4fb.exe 91 PID 1836 wrote to memory of 2452 1836 7cede8dcc9a492af7f11d54c94a0c4fb.exe 91 PID 1836 wrote to memory of 2452 1836 7cede8dcc9a492af7f11d54c94a0c4fb.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cede8dcc9a492af7f11d54c94a0c4fb.exe"C:\Users\Admin\AppData\Local\Temp\7cede8dcc9a492af7f11d54c94a0c4fb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\7cede8dcc9a492af7f11d54c94a0c4fb.exeC:\Users\Admin\AppData\Local\Temp\7cede8dcc9a492af7f11d54c94a0c4fb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD568f129a317a7f5b4dd64653705af5ad9
SHA189ec9248eb06e19f8c3c3281ecbc0a3bb56b87c7
SHA2566ee63ee9edaf0140d86142b30f8d01236753c919c7a109f80d44fbc11a28832c
SHA51216e2565665f8d0949d83be231afe6086ba4efb3a739b76edb3949a19e5c90f20e3bb1d19877dc4d42f16d482e5ea54dd790ba5207a69c0d6e73b68a04f861320