Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
0916d5aa6110437935974c7f7777283c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0916d5aa6110437935974c7f7777283c.exe
Resource
win10v2004-20231215-en
General
-
Target
0916d5aa6110437935974c7f7777283c.exe
-
Size
907KB
-
MD5
0916d5aa6110437935974c7f7777283c
-
SHA1
16add22251259c8676e87f06ec749628d51358b8
-
SHA256
8cbb999d6466520ded868cb9c201c025edb8f9f8a73cb6fa25f0a7270c435a65
-
SHA512
7e6d3ce5873e892518852a77b40b84111cc3255175c27c589ea69256d8f8a1c34fced7fc1488cdfd4640600e535b716633873f1d59f56a64b38f137ab4ae68a8
-
SSDEEP
24576:SbIRrV42Im6TCZFjZYV17UuXFjuahwB5Za/ZS1:kIL42ImsCZFjZW7UuXBuQwBvgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5084 0916d5aa6110437935974c7f7777283c.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 0916d5aa6110437935974c7f7777283c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4604 0916d5aa6110437935974c7f7777283c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4604 0916d5aa6110437935974c7f7777283c.exe 5084 0916d5aa6110437935974c7f7777283c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 5084 4604 0916d5aa6110437935974c7f7777283c.exe 88 PID 4604 wrote to memory of 5084 4604 0916d5aa6110437935974c7f7777283c.exe 88 PID 4604 wrote to memory of 5084 4604 0916d5aa6110437935974c7f7777283c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0916d5aa6110437935974c7f7777283c.exe"C:\Users\Admin\AppData\Local\Temp\0916d5aa6110437935974c7f7777283c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\0916d5aa6110437935974c7f7777283c.exeC:\Users\Admin\AppData\Local\Temp\0916d5aa6110437935974c7f7777283c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5056bec65d290544eb6901d0a2e604cb4
SHA1356d12552d66478d0875d72b3f7de580298f5927
SHA25639f49d7f704e35393d978af24d4d73cc16a7a7a3ff0ff3f83b70943b5e89420f
SHA51239aa62b6de7f49a50d7dd7a3c66f02bb381e2929711bd404ae527b04152c5ea967a966061bb2bf184842727447ed3c0e6182ff1268f785af51c68281a33ba509