Analysis
-
max time kernel
145s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 05:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10480671447fff6742b4c261f04d1877.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
10480671447fff6742b4c261f04d1877.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
10480671447fff6742b4c261f04d1877.exe
-
Size
385KB
-
MD5
10480671447fff6742b4c261f04d1877
-
SHA1
3fe0772921ae653d6dd56e057e373f8392c64755
-
SHA256
4f4fc899977aa7536b5c0cb7bbd74ef7e7c6053f21be1c25ceb6fe8244563d8a
-
SHA512
c252a8682e2ca3a3f12c3a2038cecc3bf77a10ffd891b0635410c3fd933711be969e741aaf3657dbfc5e97daaa8d0bb766ab43f4d60b2ba7df1a45ec597ba4ee
-
SSDEEP
12288:dV8hdLqjX2Q+/UFRGYw9opT5vpd6Tg9qltdP+icB:g1Q+OgYw9opT0Tggl7WicB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 10480671447fff6742b4c261f04d1877.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 10480671447fff6742b4c261f04d1877.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 10480671447fff6742b4c261f04d1877.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2192 10480671447fff6742b4c261f04d1877.exe 4756 10480671447fff6742b4c261f04d1877.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 4756 2192 10480671447fff6742b4c261f04d1877.exe 18 PID 2192 wrote to memory of 4756 2192 10480671447fff6742b4c261f04d1877.exe 18 PID 2192 wrote to memory of 4756 2192 10480671447fff6742b4c261f04d1877.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\10480671447fff6742b4c261f04d1877.exe"C:\Users\Admin\AppData\Local\Temp\10480671447fff6742b4c261f04d1877.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\10480671447fff6742b4c261f04d1877.exeC:\Users\Admin\AppData\Local\Temp\10480671447fff6742b4c261f04d1877.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4756
-