Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:01
Static task
static1
Behavioral task
behavioral1
Sample
0f6255ea442da03df4b3156d5c8cf84e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f6255ea442da03df4b3156d5c8cf84e.exe
Resource
win10v2004-20231215-en
General
-
Target
0f6255ea442da03df4b3156d5c8cf84e.exe
-
Size
385KB
-
MD5
0f6255ea442da03df4b3156d5c8cf84e
-
SHA1
dc899e862d1eacb57e118049c3e63050a0d168ec
-
SHA256
19820373a208151a532d5eb9a30ad357a4b62f8c64ba1176a9d1b2819f6fde14
-
SHA512
7597b23ac06aa3f5f5cb56c7148b87cf1a7e68e676aa9116984916924a96bb4a2b99e4e53920de42d2edfed5c0f8631d8f0c483af023e1a903c5deb4222c0f33
-
SSDEEP
6144:4TONjMnFGFUIlLz1gw5Y1ngQeO1w3yFdk3tllnIoxc3EIbQZYhB:4TtGtz195YF3pwiF+3ZnIoxcU7EB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1604 0f6255ea442da03df4b3156d5c8cf84e.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 0f6255ea442da03df4b3156d5c8cf84e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4536 0f6255ea442da03df4b3156d5c8cf84e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4536 0f6255ea442da03df4b3156d5c8cf84e.exe 1604 0f6255ea442da03df4b3156d5c8cf84e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1604 4536 0f6255ea442da03df4b3156d5c8cf84e.exe 91 PID 4536 wrote to memory of 1604 4536 0f6255ea442da03df4b3156d5c8cf84e.exe 91 PID 4536 wrote to memory of 1604 4536 0f6255ea442da03df4b3156d5c8cf84e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6255ea442da03df4b3156d5c8cf84e.exe"C:\Users\Admin\AppData\Local\Temp\0f6255ea442da03df4b3156d5c8cf84e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\0f6255ea442da03df4b3156d5c8cf84e.exeC:\Users\Admin\AppData\Local\Temp\0f6255ea442da03df4b3156d5c8cf84e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD55c12edbfed01cd877c7a0c8a6a3c8723
SHA17541ce25986e10c91af789030a6761f3fc6e6055
SHA256d673b61519a4b2379ca39f2f321f5feebdbf02896dc5a24fc4f06dba3f60832a
SHA512361d045c071eb1f0b31c884d47ebde65d018502fe2a9e7402090f0b8d0bd8df50faabb54788fd6ffd1017e109f0e13e888c7084eeca8c5c56e9829ab9a6b54c6