Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
02c70512fdc78f0c76e6d02cd61d88d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02c70512fdc78f0c76e6d02cd61d88d8.exe
Resource
win10v2004-20231222-en
General
-
Target
02c70512fdc78f0c76e6d02cd61d88d8.exe
-
Size
385KB
-
MD5
02c70512fdc78f0c76e6d02cd61d88d8
-
SHA1
993cacd6e22abce4374ccfafa683cce0e14d0906
-
SHA256
916acf0ffdf8aa2c969a15340e40fee647bbac0cc915e1ada6b78f89ae6e01ae
-
SHA512
766fb64746204d4bfb00f04b8faa3718780738a03bdf8a024a8c5946ac7ea4c53ce3213df2bc6c640820a1785d341f17889f58e5004f61fef515ddf8fee55b15
-
SSDEEP
6144:1ghva4aUOKPohhhhVjf4RkG2wHvz3kwjbnrQLKpWrZk4URnbPs+xteiayB:avNaUTEhXOiGRvzUwj/PWVk48PeiayB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 02c70512fdc78f0c76e6d02cd61d88d8.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 02c70512fdc78f0c76e6d02cd61d88d8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1260 02c70512fdc78f0c76e6d02cd61d88d8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1260 02c70512fdc78f0c76e6d02cd61d88d8.exe 2484 02c70512fdc78f0c76e6d02cd61d88d8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2484 1260 02c70512fdc78f0c76e6d02cd61d88d8.exe 18 PID 1260 wrote to memory of 2484 1260 02c70512fdc78f0c76e6d02cd61d88d8.exe 18 PID 1260 wrote to memory of 2484 1260 02c70512fdc78f0c76e6d02cd61d88d8.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c70512fdc78f0c76e6d02cd61d88d8.exe"C:\Users\Admin\AppData\Local\Temp\02c70512fdc78f0c76e6d02cd61d88d8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\02c70512fdc78f0c76e6d02cd61d88d8.exeC:\Users\Admin\AppData\Local\Temp\02c70512fdc78f0c76e6d02cd61d88d8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51b345fc2558cb57a491eeea67179a773
SHA16f8bbf644a11939f4bbc554426d796649ff89e41
SHA25662e8eff9feac7501de4364418ba03c00d3a1c925805476fd5f0e4c61a5f7db38
SHA51267df071c57ffe9533256479b7aaa4754f45e600824645e05c1449e5816a64b30850f83a207429c5c0f4b7e233c8de112210b262c43b5c7b1992fcee75d8c108c