Analysis
-
max time kernel
137s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
0fe86ceffbd44fd4ad452dddf2ed46b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fe86ceffbd44fd4ad452dddf2ed46b1.exe
Resource
win10v2004-20231215-en
General
-
Target
0fe86ceffbd44fd4ad452dddf2ed46b1.exe
-
Size
385KB
-
MD5
0fe86ceffbd44fd4ad452dddf2ed46b1
-
SHA1
5e5a9908a32b36c5a653bece2b64c0653c635d19
-
SHA256
6e0b3adc37a295bb14a836f102f99abe5517afbb3e25ad92edc96341a7c43b8b
-
SHA512
d93e7c9e2fa67d4dbcf74a7b9a8955de5d48e3d038f0b7dc1cf9d7bd3b7ce23719eb123d19d3d7d8b006ded2f7b9e3d2613fb548724c8da7da306b5fa9b5591b
-
SSDEEP
12288:/FtsCF8Wy4p6ECq01x/Ox7DQB6z2vUtHiyB:/rsEPYfqhI6z2vWHiyB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1492 0fe86ceffbd44fd4ad452dddf2ed46b1.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 0fe86ceffbd44fd4ad452dddf2ed46b1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1100 0fe86ceffbd44fd4ad452dddf2ed46b1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1100 0fe86ceffbd44fd4ad452dddf2ed46b1.exe 1492 0fe86ceffbd44fd4ad452dddf2ed46b1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1492 1100 0fe86ceffbd44fd4ad452dddf2ed46b1.exe 91 PID 1100 wrote to memory of 1492 1100 0fe86ceffbd44fd4ad452dddf2ed46b1.exe 91 PID 1100 wrote to memory of 1492 1100 0fe86ceffbd44fd4ad452dddf2ed46b1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fe86ceffbd44fd4ad452dddf2ed46b1.exe"C:\Users\Admin\AppData\Local\Temp\0fe86ceffbd44fd4ad452dddf2ed46b1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\0fe86ceffbd44fd4ad452dddf2ed46b1.exeC:\Users\Admin\AppData\Local\Temp\0fe86ceffbd44fd4ad452dddf2ed46b1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5c331f67f3a17533057d666258436a6c6
SHA13b59a414be851ba8b3e96141632ce97502d4d3f8
SHA2564d8bca64f679dbfe1ba847b806b23b401479b637431090dc27fc24a914b15bfe
SHA512101aee3c1d1d7e8319a0a7f72c429e6642ecabf90454334b11d60b1c8ef9d14aa82da990b562e6dc668cb8e1ff7be51fb19804b159406bc676cbb64ef9daf512