Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:42
Static task
static1
Behavioral task
behavioral1
Sample
0d4a6de11ef378c5037e6f633f779e09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d4a6de11ef378c5037e6f633f779e09.exe
Resource
win10v2004-20231215-en
General
-
Target
0d4a6de11ef378c5037e6f633f779e09.exe
-
Size
385KB
-
MD5
0d4a6de11ef378c5037e6f633f779e09
-
SHA1
2fff72d3c271d068de1b9ee5c9c73e93e9ef9534
-
SHA256
646cc9913f23b96c181513a2c4f702a4e8cc74c7ec556c40597dbdc86d694740
-
SHA512
3aaa94e784e15464224a6860d00d850b682d264097c6156bbd67b2b2143616e2144e2abc6a1284af0d90b8d80f2508bbd1c4bffb1aebf7424b83bafa3e18d760
-
SSDEEP
6144:lb8q3/aoLr1HcL4qBPOSCSM6WPjIUQsUc5M4dfiwEe7YSXZHtm4uwumoaBUslnep:zaoLrVctP46WPjIPsUc5btF1HXZpdnCB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2020 0d4a6de11ef378c5037e6f633f779e09.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 0d4a6de11ef378c5037e6f633f779e09.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4236 0d4a6de11ef378c5037e6f633f779e09.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4236 0d4a6de11ef378c5037e6f633f779e09.exe 2020 0d4a6de11ef378c5037e6f633f779e09.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4236 wrote to memory of 2020 4236 0d4a6de11ef378c5037e6f633f779e09.exe 91 PID 4236 wrote to memory of 2020 4236 0d4a6de11ef378c5037e6f633f779e09.exe 91 PID 4236 wrote to memory of 2020 4236 0d4a6de11ef378c5037e6f633f779e09.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d4a6de11ef378c5037e6f633f779e09.exe"C:\Users\Admin\AppData\Local\Temp\0d4a6de11ef378c5037e6f633f779e09.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\0d4a6de11ef378c5037e6f633f779e09.exeC:\Users\Admin\AppData\Local\Temp\0d4a6de11ef378c5037e6f633f779e09.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58c2e4fd990e2f6c235fca1ee34b12563
SHA1794e0d2f6e9659ee72a9c27339ec32234f2fed61
SHA2562a072ef602afc723d012de434e908f4ffdbf31a5216afbdbbbb2d1d9c3237c6e
SHA51225912d9caad6d34d77add94b1d38a0fdf633612055b708c17de42615f7f3595b0a6b484c113860bf840607d2a24ab68ea5253959d887805fcee8156cef6f0796