Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
7ed8647f871faa1b943c7b3e8376614c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7ed8647f871faa1b943c7b3e8376614c.exe
Resource
win10v2004-20231215-en
General
-
Target
7ed8647f871faa1b943c7b3e8376614c.exe
-
Size
907KB
-
MD5
7ed8647f871faa1b943c7b3e8376614c
-
SHA1
ba8b71004e748923c037bbb2bb28c48c4d499628
-
SHA256
84b98175924a9f9c4decf04a98cd6edc1660bffe9d46b00296cf073c4ea7dd61
-
SHA512
0168ef9b488934441bf2c1949c80bfc8f1052e04382a77caac5f8be157ce4ec594df794942f698d0d4e79d4e3d1c583b9ec083f4795e532a75c860823b3bacba
-
SSDEEP
12288:Ea5Nk5t6SxpR8+3afCwinnDeuk8qj8mMdHEufxuWgtf75pm1DiuI/jVDa/ZS1:0/6f+Kaxnrro87DFn1lIta/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1180 7ed8647f871faa1b943c7b3e8376614c.exe -
Executes dropped EXE 1 IoCs
pid Process 1180 7ed8647f871faa1b943c7b3e8376614c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4068 7ed8647f871faa1b943c7b3e8376614c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4068 7ed8647f871faa1b943c7b3e8376614c.exe 1180 7ed8647f871faa1b943c7b3e8376614c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1180 4068 7ed8647f871faa1b943c7b3e8376614c.exe 29 PID 4068 wrote to memory of 1180 4068 7ed8647f871faa1b943c7b3e8376614c.exe 29 PID 4068 wrote to memory of 1180 4068 7ed8647f871faa1b943c7b3e8376614c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ed8647f871faa1b943c7b3e8376614c.exe"C:\Users\Admin\AppData\Local\Temp\7ed8647f871faa1b943c7b3e8376614c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\7ed8647f871faa1b943c7b3e8376614c.exeC:\Users\Admin\AppData\Local\Temp\7ed8647f871faa1b943c7b3e8376614c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5459f2f1f210620eb0133e4f0191c6fe9
SHA1fe3c5a1db873daeb6f9a775e5d29634ce39e005a
SHA256ef498c3b7dc82cc1fb2767c2f41f36ff61572a37e72902ce82ee18d01d31ccf1
SHA5128473cd033f051254ac650f4b189507e38a59bd5f7ce8cba0ce7ac3ee69891b1357b763a1e862ef120039bcd15482857acdd025136168fad8c3bcb5d4e9590d5f