Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 18:21
Static task
static1
Behavioral task
behavioral1
Sample
004ded0aeb427c1caed4b74516054f30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
004ded0aeb427c1caed4b74516054f30.exe
Resource
win10v2004-20231215-en
General
-
Target
004ded0aeb427c1caed4b74516054f30.exe
-
Size
385KB
-
MD5
004ded0aeb427c1caed4b74516054f30
-
SHA1
ed68a28cf66e01b5d7aa3c7aff087fcea15b6e41
-
SHA256
7e0fd637cf15519cf93f5705b9526731257c928369b90225f23ffb54a2ad6c4d
-
SHA512
9fcdd5f48270a821d5cb96b5d63a61f22d343ea7a7ce43c6b0f2ecce833a86cb23c8a9edaae45fb8abc15a4b7b585c03805e6ad21355e3a41c38ecd7579086d6
-
SSDEEP
6144:Kw8fmQI/gUOv/1HswvILwFrqjx8K3SAYNc0mF+qXH0sxuvCT8GX+B:efmXgUSdHTILwFrkmK3QcFXvx8c+B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3784 004ded0aeb427c1caed4b74516054f30.exe -
Executes dropped EXE 1 IoCs
pid Process 3784 004ded0aeb427c1caed4b74516054f30.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2120 004ded0aeb427c1caed4b74516054f30.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2120 004ded0aeb427c1caed4b74516054f30.exe 3784 004ded0aeb427c1caed4b74516054f30.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3784 2120 004ded0aeb427c1caed4b74516054f30.exe 89 PID 2120 wrote to memory of 3784 2120 004ded0aeb427c1caed4b74516054f30.exe 89 PID 2120 wrote to memory of 3784 2120 004ded0aeb427c1caed4b74516054f30.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\004ded0aeb427c1caed4b74516054f30.exe"C:\Users\Admin\AppData\Local\Temp\004ded0aeb427c1caed4b74516054f30.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\004ded0aeb427c1caed4b74516054f30.exeC:\Users\Admin\AppData\Local\Temp\004ded0aeb427c1caed4b74516054f30.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD50f203d3638fcc748f08a0278ae36264e
SHA10617c3bf70bb346e8ac3da25cc73583c058f2fb4
SHA25637e53cbc88c7e2247fcc89c2c34b3570607b036b83b6164afcf31b9eecbdd125
SHA5122d3d3d925962e111cad41e198cf78bb19bf1839918ddb6b3027ea548f6fb0cccacd6db359bcd7c38efb2ee9ad63514dcb02f12f5d9be9dcf13105ff322a2c95e