Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
01399cc44b3ae911d9bfa978c2c56f7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01399cc44b3ae911d9bfa978c2c56f7d.exe
Resource
win10v2004-20231215-en
General
-
Target
01399cc44b3ae911d9bfa978c2c56f7d.exe
-
Size
771KB
-
MD5
01399cc44b3ae911d9bfa978c2c56f7d
-
SHA1
a53c6901799079acba8dd96eeabf805295f37440
-
SHA256
071bed7d97bf9f8653636641d3807533613b4ea9255b85bd17d902d6f4038bec
-
SHA512
7987ab632c3fa36912f6a6dd541d3edb3aeee1257b2fa712e58316dbe71f8ad02379221c2ef456249d2fc309f10f7deaa097a216e4c971e97513755f558bd0bb
-
SSDEEP
24576:vPnBkdTnPJMh7SHfb/qb10hJaothZ2/T6FBBB:XnBoTnPG1+M/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4864 01399cc44b3ae911d9bfa978c2c56f7d.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 01399cc44b3ae911d9bfa978c2c56f7d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1568 01399cc44b3ae911d9bfa978c2c56f7d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1568 01399cc44b3ae911d9bfa978c2c56f7d.exe 4864 01399cc44b3ae911d9bfa978c2c56f7d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4864 1568 01399cc44b3ae911d9bfa978c2c56f7d.exe 89 PID 1568 wrote to memory of 4864 1568 01399cc44b3ae911d9bfa978c2c56f7d.exe 89 PID 1568 wrote to memory of 4864 1568 01399cc44b3ae911d9bfa978c2c56f7d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\01399cc44b3ae911d9bfa978c2c56f7d.exe"C:\Users\Admin\AppData\Local\Temp\01399cc44b3ae911d9bfa978c2c56f7d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\01399cc44b3ae911d9bfa978c2c56f7d.exeC:\Users\Admin\AppData\Local\Temp\01399cc44b3ae911d9bfa978c2c56f7d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD585094fa7d16b03037626548ff39f6fc1
SHA15a2e32b654fe4f51fc7ddc104b6695cc7bdf95ab
SHA256f9eade2a245392ff91f5b5a82448fc9af909da96a9ced9e971110ddbecfc9717
SHA5125b33fe093acb447fcba7085e9a256d750fe3ad334fb7f3b6dc0543667b8a1b398be26a7d6641e6057a67b6822b0b58069e9fe4de7be8b26978124612af1eed37