Analysis
-
max time kernel
144s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 02:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b5e27fe9f22c1909ccdf12348297d31.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b5e27fe9f22c1909ccdf12348297d31.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0b5e27fe9f22c1909ccdf12348297d31.exe
-
Size
385KB
-
MD5
0b5e27fe9f22c1909ccdf12348297d31
-
SHA1
c90e8157bb4bb5ac9f6dd289c067166371f36246
-
SHA256
c6663bed68eed8135590831ad7ada1d4242a646abb812ddbf1cee20c2d3dcfd8
-
SHA512
203d8e05a08f8ff34ae592a58d4d02b5864dea1b31f88df5138cccd68fd70721bad8d469afcdd512d1bc5ba7675204ce1c515fc189443a46d97f9111ac28baf8
-
SSDEEP
6144:vZO9l0LrUhvj9edUhe996hkDIyxeqgcehmbp9DzfnX8mMHSs9vBHg49zJb5b5GBG:Mta/IyY7gbp9Djsms9NbN5ch2jFB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3460 0b5e27fe9f22c1909ccdf12348297d31.exe -
Executes dropped EXE 1 IoCs
pid Process 3460 0b5e27fe9f22c1909ccdf12348297d31.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4996 0b5e27fe9f22c1909ccdf12348297d31.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4996 0b5e27fe9f22c1909ccdf12348297d31.exe 3460 0b5e27fe9f22c1909ccdf12348297d31.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 3460 4996 0b5e27fe9f22c1909ccdf12348297d31.exe 18 PID 4996 wrote to memory of 3460 4996 0b5e27fe9f22c1909ccdf12348297d31.exe 18 PID 4996 wrote to memory of 3460 4996 0b5e27fe9f22c1909ccdf12348297d31.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe"C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exeC:\Users\Admin\AppData\Local\Temp\0b5e27fe9f22c1909ccdf12348297d31.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3460
-