Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
052aed5b047b14e6f258c446869c3965.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
052aed5b047b14e6f258c446869c3965.exe
Resource
win10v2004-20231222-en
General
-
Target
052aed5b047b14e6f258c446869c3965.exe
-
Size
385KB
-
MD5
052aed5b047b14e6f258c446869c3965
-
SHA1
5024463c3d8af4ee23dc3192a2deb14249f49d49
-
SHA256
3e88aa6bb37a439378cc9979bf924825fe00442137af183f7e6a445fae597cfd
-
SHA512
c4a2136bff50234b165bd1222020ca1228dde245bc710c90da57c6142631002527d0f3ad1afa9537571c5a6a7a0c03b8dc319d6b8e56ebea6006c05b13e1206a
-
SSDEEP
12288:nIaRo+IcxLISUVcviJIS/AO7AYCwtriCB:5RoQxUSsMk17RrxiCB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 052aed5b047b14e6f258c446869c3965.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 052aed5b047b14e6f258c446869c3965.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 052aed5b047b14e6f258c446869c3965.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 824 052aed5b047b14e6f258c446869c3965.exe 2488 052aed5b047b14e6f258c446869c3965.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 824 wrote to memory of 2488 824 052aed5b047b14e6f258c446869c3965.exe 87 PID 824 wrote to memory of 2488 824 052aed5b047b14e6f258c446869c3965.exe 87 PID 824 wrote to memory of 2488 824 052aed5b047b14e6f258c446869c3965.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\052aed5b047b14e6f258c446869c3965.exe"C:\Users\Admin\AppData\Local\Temp\052aed5b047b14e6f258c446869c3965.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\052aed5b047b14e6f258c446869c3965.exeC:\Users\Admin\AppData\Local\Temp\052aed5b047b14e6f258c446869c3965.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fd295ce2a2b41d62b0d0ee84e4bf5f41
SHA1527e163e6c28e4ed67f2f2f20e31f68e70742877
SHA2568eaf3e3ec86db9d2e0b286840cdd5223e8551561110f70322cff18c3ccc4eee4
SHA5123f3bfa3923311e40edd375571588431bf837c02e8b3cf405924bbda87d1d1ae8492d15c3f830e167ba8223db93a8135e809ba36b7cd09a8af99022ec3bc06743