Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
0efe75cc47c10e23b078371bf169705f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0efe75cc47c10e23b078371bf169705f.exe
Resource
win10v2004-20231215-en
General
-
Target
0efe75cc47c10e23b078371bf169705f.exe
-
Size
385KB
-
MD5
0efe75cc47c10e23b078371bf169705f
-
SHA1
663fe3c906302397b09c391b56660a59e858f531
-
SHA256
3d60345056e4389eb5f8fac7e5dcdc4beb43b715aed8e1e4593870d2d87bbf6e
-
SHA512
a6853cefce6c5d42cf81744ab5a9b6cb3039edb7e20ff95a6b76f1127de45684dbdcbba0b77c298a694ab13bc5cc7dc70686086d3b50deb168169ffc3a013846
-
SSDEEP
6144:fT4+umOMZ/mVcKSCv03/TIHrtVhEzW79aDhkEugbsiFLZKJv/C0K0SdjhpmCyiB:fgmVZeuK5vptszW79aljFNKJS0chVB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4824 0efe75cc47c10e23b078371bf169705f.exe -
Executes dropped EXE 1 IoCs
pid Process 4824 0efe75cc47c10e23b078371bf169705f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 748 0efe75cc47c10e23b078371bf169705f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 748 0efe75cc47c10e23b078371bf169705f.exe 4824 0efe75cc47c10e23b078371bf169705f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 748 wrote to memory of 4824 748 0efe75cc47c10e23b078371bf169705f.exe 89 PID 748 wrote to memory of 4824 748 0efe75cc47c10e23b078371bf169705f.exe 89 PID 748 wrote to memory of 4824 748 0efe75cc47c10e23b078371bf169705f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0efe75cc47c10e23b078371bf169705f.exe"C:\Users\Admin\AppData\Local\Temp\0efe75cc47c10e23b078371bf169705f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\0efe75cc47c10e23b078371bf169705f.exeC:\Users\Admin\AppData\Local\Temp\0efe75cc47c10e23b078371bf169705f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f8c80d765d4c1e53278a9198927da396
SHA10e94635403d6a0360762765e1d0d1ac776704fa3
SHA256f8a8a879cfa4516913b11d4f0ea17d91020109e1f5a1f85c6ed934081e85ea9d
SHA512d2667675dff5619b9efb65f2c034f3f53d1cdc0e9943ae25df5a5fd8df5002f7d7bed22d37f68d9202c1f347d6cd1d05bc62efdbc278e33697922c774a78eac9