Analysis
-
max time kernel
147s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
0ca48cc9684a722a500bac6f2dc925ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ca48cc9684a722a500bac6f2dc925ec.exe
Resource
win10v2004-20231222-en
General
-
Target
0ca48cc9684a722a500bac6f2dc925ec.exe
-
Size
385KB
-
MD5
0ca48cc9684a722a500bac6f2dc925ec
-
SHA1
a406ab6b2a6af84a371910037f4dc702cf814fef
-
SHA256
0841e9f9d2136426b946fd12962d1c197436fe314d8938d3e25868763f71ac68
-
SHA512
07fa2249a98d3be0b3e54fe2972a16eae0be4baca70726acd2e1b50fa24c8e2ce52120ceabffd655a7cf4064646619db66c841cf72951dd9ad26ddee217b7a6c
-
SSDEEP
6144:XH87A2+RC2F7/EFqVpjXxp3TBlAKLJIOB6IEnpED2wWHAIuw1FB:cN+qqXxxTTAuJIOB6NpGmHOw7B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3232 0ca48cc9684a722a500bac6f2dc925ec.exe -
Executes dropped EXE 1 IoCs
pid Process 3232 0ca48cc9684a722a500bac6f2dc925ec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2432 0ca48cc9684a722a500bac6f2dc925ec.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2432 0ca48cc9684a722a500bac6f2dc925ec.exe 3232 0ca48cc9684a722a500bac6f2dc925ec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3232 2432 0ca48cc9684a722a500bac6f2dc925ec.exe 20 PID 2432 wrote to memory of 3232 2432 0ca48cc9684a722a500bac6f2dc925ec.exe 20 PID 2432 wrote to memory of 3232 2432 0ca48cc9684a722a500bac6f2dc925ec.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca48cc9684a722a500bac6f2dc925ec.exe"C:\Users\Admin\AppData\Local\Temp\0ca48cc9684a722a500bac6f2dc925ec.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\0ca48cc9684a722a500bac6f2dc925ec.exeC:\Users\Admin\AppData\Local\Temp\0ca48cc9684a722a500bac6f2dc925ec.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52a945d5c805301dfb6da982a82a968f1
SHA1f11953b46e6e0d1672ba43cc37c7e884f2477c0b
SHA25601f5e782b4e0ac68d1fff3c028bad555b6e341d4b8bb79ccefb71b3b4689f81b
SHA512ea846250fd595b6a0c84a377a5b45dff2d18da15747cb6fcbcaf9e0d1a171abafabce97d97612722d9e7c88ead2d5e3ebe54347b9a38856ae2840984ac1c6154