Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
01eb594156f5cae6d8c18b1fae50b535.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01eb594156f5cae6d8c18b1fae50b535.exe
Resource
win10v2004-20231222-en
General
-
Target
01eb594156f5cae6d8c18b1fae50b535.exe
-
Size
385KB
-
MD5
01eb594156f5cae6d8c18b1fae50b535
-
SHA1
554d28246f78beb3539cb1c05a2749af60f9ccff
-
SHA256
27a18aaed1da140d92b315747de17a47dbe0fc8b874674ac93061b5a3a62162b
-
SHA512
635909839cfb61dc31c6cac4edfa4919599880c0f603c9fa98896815f6a8bef5c12137c390bd0c0560fa9e7e6dc8499ed719029ee6305819a9802b93d6359f5e
-
SSDEEP
12288:/HI2gLaBXftpMQqps/DPWu4RyBo6YAUJNLKYQndB://geBPtpMGdGpbSdB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4024 01eb594156f5cae6d8c18b1fae50b535.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 01eb594156f5cae6d8c18b1fae50b535.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4616 01eb594156f5cae6d8c18b1fae50b535.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4616 01eb594156f5cae6d8c18b1fae50b535.exe 4024 01eb594156f5cae6d8c18b1fae50b535.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4024 4616 01eb594156f5cae6d8c18b1fae50b535.exe 22 PID 4616 wrote to memory of 4024 4616 01eb594156f5cae6d8c18b1fae50b535.exe 22 PID 4616 wrote to memory of 4024 4616 01eb594156f5cae6d8c18b1fae50b535.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\01eb594156f5cae6d8c18b1fae50b535.exe"C:\Users\Admin\AppData\Local\Temp\01eb594156f5cae6d8c18b1fae50b535.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\01eb594156f5cae6d8c18b1fae50b535.exeC:\Users\Admin\AppData\Local\Temp\01eb594156f5cae6d8c18b1fae50b535.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD588dca699f02d9ee6551f25f73f9b3aaa
SHA1684035aa7e079c0bee870d7d7affa3fc18228f19
SHA25620b236cab80e4f7998770159d669a65f44498c2fb4cc3947f8fbaad1cbc8a857
SHA512e0b6148eb1e4316dd61ef98f0248d762b8bd5ae7fbbe710d0b8965a58378b37639d70aace995b1a6dd2351250e5b04309d5bda955b914ec29770a645c9f41074