Analysis
-
max time kernel
136s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
0a6864976e7642ca080a793e83ccea25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a6864976e7642ca080a793e83ccea25.exe
Resource
win10v2004-20231215-en
General
-
Target
0a6864976e7642ca080a793e83ccea25.exe
-
Size
385KB
-
MD5
0a6864976e7642ca080a793e83ccea25
-
SHA1
fda6c8ff4658a39f750ecb108dc14b77ab4946fe
-
SHA256
0471bab09070ac22f402c108afde68db5394cb4fbca4f77fe8d71370c0808d92
-
SHA512
cb1e99c38ca88c1e3e924a198864404f328d7d9fd2dc3f825f0914bcaeadbf511c48690c2c74aa56198a18c9d5b50892f022497484b1cd2580594f106884ba3c
-
SSDEEP
6144:5jtLZiSavfHsVaaM5ThuocRt0GpR6oNf/f72I0ijowrJ8snqvqrZB:ISanHHamThrcr02R3WGJjaqrZB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 700 0a6864976e7642ca080a793e83ccea25.exe -
Executes dropped EXE 1 IoCs
pid Process 700 0a6864976e7642ca080a793e83ccea25.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4752 0a6864976e7642ca080a793e83ccea25.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4752 0a6864976e7642ca080a793e83ccea25.exe 700 0a6864976e7642ca080a793e83ccea25.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 700 4752 0a6864976e7642ca080a793e83ccea25.exe 90 PID 4752 wrote to memory of 700 4752 0a6864976e7642ca080a793e83ccea25.exe 90 PID 4752 wrote to memory of 700 4752 0a6864976e7642ca080a793e83ccea25.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a6864976e7642ca080a793e83ccea25.exe"C:\Users\Admin\AppData\Local\Temp\0a6864976e7642ca080a793e83ccea25.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\0a6864976e7642ca080a793e83ccea25.exeC:\Users\Admin\AppData\Local\Temp\0a6864976e7642ca080a793e83ccea25.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5782eb2bb1ce3dc3b0b2a2a221e3c2c1f
SHA12428676cd279c3824bd95cb3281423215a3c9573
SHA25670ea6147b8be12fb2e51b96faaa2e34178b98c414ba45a5fc248bbfee0cd988e
SHA5120e7fb5f2d6e666c27330df766fe462bfb9448762b478742ac0362f27f81b1a94cfcf6e52ac79460c840c4327a60df4288014905fcd69a8d366eee232b24db44e