Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
00c06879a479bc32fb97ef5f71d45b1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00c06879a479bc32fb97ef5f71d45b1d.exe
Resource
win10v2004-20231222-en
General
-
Target
00c06879a479bc32fb97ef5f71d45b1d.exe
-
Size
385KB
-
MD5
00c06879a479bc32fb97ef5f71d45b1d
-
SHA1
986e165193e0fb51ff2318392a8ffecfc8f02ee9
-
SHA256
72d55349e957545c2340ec0b896166338bfba34c73b31e49776d856cb9a93093
-
SHA512
121b80f1f2c67337cdbfcdad0ecbfb90766cace541b372499e14062e55d5ed5b7325ce0a34081d750a0cdcc07c823806ee5f8f8be087e7a7b6079cea9ad93ea2
-
SSDEEP
12288:e4gHKBZYicBQZskfxtaGndk8GOIiY9iusZeynnmYk4sRqNQ74mS+/fCGGJtxHPGI:RVVnU3+J2+oSB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1592 00c06879a479bc32fb97ef5f71d45b1d.exe -
Executes dropped EXE 1 IoCs
pid Process 1592 00c06879a479bc32fb97ef5f71d45b1d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2760 00c06879a479bc32fb97ef5f71d45b1d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2760 00c06879a479bc32fb97ef5f71d45b1d.exe 1592 00c06879a479bc32fb97ef5f71d45b1d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1592 2760 00c06879a479bc32fb97ef5f71d45b1d.exe 89 PID 2760 wrote to memory of 1592 2760 00c06879a479bc32fb97ef5f71d45b1d.exe 89 PID 2760 wrote to memory of 1592 2760 00c06879a479bc32fb97ef5f71d45b1d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\00c06879a479bc32fb97ef5f71d45b1d.exe"C:\Users\Admin\AppData\Local\Temp\00c06879a479bc32fb97ef5f71d45b1d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\00c06879a479bc32fb97ef5f71d45b1d.exeC:\Users\Admin\AppData\Local\Temp\00c06879a479bc32fb97ef5f71d45b1d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD565a659dc2a8ed507661963d6fcc4a23c
SHA1e27fdc4386443e5e1ba1a67f4ae4362eec9b020c
SHA2561c37fde19775a4d40d21357a33eb77c06545fa43578d01cdd445a48cf72bfcb0
SHA512dfa528e0e732c6d0c8d51d79a5f97eed09bb26ac628252d8d02329c3fb726130c93d3c8b7c8ceb37f5a40f12ecb7c219578162b79389f86562422dbe843f4db9