Analysis
-
max time kernel
143s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
1027d2467dd98d43ebc705340dfdef7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1027d2467dd98d43ebc705340dfdef7d.exe
Resource
win10v2004-20231215-en
General
-
Target
1027d2467dd98d43ebc705340dfdef7d.exe
-
Size
385KB
-
MD5
1027d2467dd98d43ebc705340dfdef7d
-
SHA1
87d5d7d10f13a89babe6eec355ebfe4535263da5
-
SHA256
58df17947b682d9156417833793c8c41ce7dd6abd900475f6807dbb8a8293db3
-
SHA512
80d9e363c13144b323b1f8d6e37b87ff78c0f4c1deda990dd63bedd25f9b6cbbbe224193d58f2a6d32ad6d22bc7a3e0f7155d5e7b96c50d4bef58448a293776f
-
SSDEEP
12288:iK+7u4r2yt1GZ6bQvCYKnNuyDEjc1/OeSJ6Ri/jnUOamQVB:iE4ovbCMuB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 888 1027d2467dd98d43ebc705340dfdef7d.exe -
Executes dropped EXE 1 IoCs
pid Process 888 1027d2467dd98d43ebc705340dfdef7d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 1027d2467dd98d43ebc705340dfdef7d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 1027d2467dd98d43ebc705340dfdef7d.exe 888 1027d2467dd98d43ebc705340dfdef7d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 888 1844 1027d2467dd98d43ebc705340dfdef7d.exe 91 PID 1844 wrote to memory of 888 1844 1027d2467dd98d43ebc705340dfdef7d.exe 91 PID 1844 wrote to memory of 888 1844 1027d2467dd98d43ebc705340dfdef7d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1027d2467dd98d43ebc705340dfdef7d.exe"C:\Users\Admin\AppData\Local\Temp\1027d2467dd98d43ebc705340dfdef7d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\1027d2467dd98d43ebc705340dfdef7d.exeC:\Users\Admin\AppData\Local\Temp\1027d2467dd98d43ebc705340dfdef7d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD50783f53f39cb730fb96f193ffdd23da7
SHA17a1ef4163f2d0228b9ce776dc7681dc4a99e8a6f
SHA25626621f31e5bc17735a2dcf46a5c95306e45c0196778967d170ff40eca9b9e109
SHA5121af3cdf22df7fc9fa7bac7a110f30ce17ec6124c045f1998b49e25a4c5d0a3d8ee008866820f50ef9d321826e22f01e0d891762f7fd0f60f1a8db6d784627bf4