Analysis
-
max time kernel
158s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
06dbc1e19eb9f32684b8949e9a9fd630.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06dbc1e19eb9f32684b8949e9a9fd630.exe
Resource
win10v2004-20231215-en
General
-
Target
06dbc1e19eb9f32684b8949e9a9fd630.exe
-
Size
385KB
-
MD5
06dbc1e19eb9f32684b8949e9a9fd630
-
SHA1
8294229be66a6db1c3ee713175eca81ff1b8ccd4
-
SHA256
9d3f145f8ebb1a0597053a2b37a62f5fe820a989f6c30049f9be943514563b1d
-
SHA512
0ba9c860e8d3334bae95468b3078b5ea4a277c77f9ad8dd1a70fe78344edf5e493aed06a213e2ca55a92f3331510eac98c5409ba55c9f4d70288a161033ea316
-
SSDEEP
6144:IdHbnO86/Qh7ZMcGoVKUeFTqOpL6eoe6ebFNmnNGp0TKlf6eB:IdHbp3BveMGLVovebFNmnEp6Klf6eB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4116 06dbc1e19eb9f32684b8949e9a9fd630.exe -
Executes dropped EXE 1 IoCs
pid Process 4116 06dbc1e19eb9f32684b8949e9a9fd630.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4080 06dbc1e19eb9f32684b8949e9a9fd630.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4080 06dbc1e19eb9f32684b8949e9a9fd630.exe 4116 06dbc1e19eb9f32684b8949e9a9fd630.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4116 4080 06dbc1e19eb9f32684b8949e9a9fd630.exe 92 PID 4080 wrote to memory of 4116 4080 06dbc1e19eb9f32684b8949e9a9fd630.exe 92 PID 4080 wrote to memory of 4116 4080 06dbc1e19eb9f32684b8949e9a9fd630.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\06dbc1e19eb9f32684b8949e9a9fd630.exe"C:\Users\Admin\AppData\Local\Temp\06dbc1e19eb9f32684b8949e9a9fd630.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\06dbc1e19eb9f32684b8949e9a9fd630.exeC:\Users\Admin\AppData\Local\Temp\06dbc1e19eb9f32684b8949e9a9fd630.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a3eb12b4061cc07d24b090e02e19df52
SHA1920eadaab823036bf80ddb742e4d5169788bdc7c
SHA256a7c7f02fbac2c6c25938a874eed2d78cc7167f60129219253ea41c944a2dc4d5
SHA512b5741ed016e99453dac18ec50ab2a4379b56551458a75c9091424e02dd13a758af3440acd8c67bbe5d40b8574dc35e30ba092c4ce1c18ec047295e886a817625