Analysis
-
max time kernel
127s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:42
Static task
static1
Behavioral task
behavioral1
Sample
0a70dcdb743feaa73a1934d1980bc0e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a70dcdb743feaa73a1934d1980bc0e0.exe
Resource
win10v2004-20231215-en
General
-
Target
0a70dcdb743feaa73a1934d1980bc0e0.exe
-
Size
385KB
-
MD5
0a70dcdb743feaa73a1934d1980bc0e0
-
SHA1
ab75d39d219a6a8df5b6d26ab52c739ee17815a6
-
SHA256
81096bbb61ae465bb1aed840adfa7ec6f8dc2325d68c9a660d99e16417c0a23a
-
SHA512
a2bbbc28137f4c06cb64b9a3fd8175cb2c7db34dc0cd854b49547bf2ccbf50782f3f7e223e7a230d9422c685ce6fb75bcfca1744e72496a180740feb80dfb4aa
-
SSDEEP
6144:cpzN5dD1p4NOy6YdQ2KGctFfzF8wGGeWWGsDoqaRms03Phme/Q/JUw5+y63yiuB:yzWNvMGcfleCpqPs03JmyQS4+y63/uB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4972 0a70dcdb743feaa73a1934d1980bc0e0.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 0a70dcdb743feaa73a1934d1980bc0e0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4228 0a70dcdb743feaa73a1934d1980bc0e0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4228 0a70dcdb743feaa73a1934d1980bc0e0.exe 4972 0a70dcdb743feaa73a1934d1980bc0e0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4972 4228 0a70dcdb743feaa73a1934d1980bc0e0.exe 89 PID 4228 wrote to memory of 4972 4228 0a70dcdb743feaa73a1934d1980bc0e0.exe 89 PID 4228 wrote to memory of 4972 4228 0a70dcdb743feaa73a1934d1980bc0e0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a70dcdb743feaa73a1934d1980bc0e0.exe"C:\Users\Admin\AppData\Local\Temp\0a70dcdb743feaa73a1934d1980bc0e0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\0a70dcdb743feaa73a1934d1980bc0e0.exeC:\Users\Admin\AppData\Local\Temp\0a70dcdb743feaa73a1934d1980bc0e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5f2a49894108ecb5bf4f377a9f835608f
SHA1aa106c7a46bed052420a3458e5841bb8a545395e
SHA2561907662bb595411d4a2c172568f5a4f6f2243cdfe42df93d2fd702f23db59d87
SHA512cce05faacb3e81a698c2d5c8720751b7cd6b0291e4761fc800bdbbbbcf08bbfbd56722afa46b3a938183d5a4ea5944462941cc6e55a910507db4f55c451b2708