Analysis
-
max time kernel
146s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
20792b31d656335b4734321cb5abafc0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20792b31d656335b4734321cb5abafc0.exe
Resource
win10v2004-20231215-en
General
-
Target
20792b31d656335b4734321cb5abafc0.exe
-
Size
385KB
-
MD5
20792b31d656335b4734321cb5abafc0
-
SHA1
d50528946eb9764b244f701b4dece037f49c1ea2
-
SHA256
2efa3e830546ce3557390ea452e9b39a427ba2338aa06835e5fd77c28205c2f5
-
SHA512
e1a39c319ff966e068f131cec6ab455e212965d8c10f47b1b2452189474482e8103e7aa4907c5726b1098801fcdfc5d138ff9d81831562c93e8cf386ff4b71d3
-
SSDEEP
12288:YcOpzegBKhryn2SmwRcEWvSX14D9lIJspYB:YcSagwBynFmYDVoYB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3220 20792b31d656335b4734321cb5abafc0.exe -
Executes dropped EXE 1 IoCs
pid Process 3220 20792b31d656335b4734321cb5abafc0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4632 20792b31d656335b4734321cb5abafc0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4632 20792b31d656335b4734321cb5abafc0.exe 3220 20792b31d656335b4734321cb5abafc0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3220 4632 20792b31d656335b4734321cb5abafc0.exe 90 PID 4632 wrote to memory of 3220 4632 20792b31d656335b4734321cb5abafc0.exe 90 PID 4632 wrote to memory of 3220 4632 20792b31d656335b4734321cb5abafc0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\20792b31d656335b4734321cb5abafc0.exe"C:\Users\Admin\AppData\Local\Temp\20792b31d656335b4734321cb5abafc0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\20792b31d656335b4734321cb5abafc0.exeC:\Users\Admin\AppData\Local\Temp\20792b31d656335b4734321cb5abafc0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD563b40c59a1aff4f6cc0072b89c7fa6b4
SHA154a5aca4631cbb74e070fb85387e6aefe04b3385
SHA2566b13f60773547705a7fc6f077a0e4811cad5a2b0795587e449f3e889aaee5e4d
SHA51212174dbb3c8299b7a37658cfa4e7a4391714c500bbda3ddd6ecdefa2d5837f5db6e1d7f8bc292c55721c5f7fba6e79cad95b66bd400c3fed082ce2de5110216b