Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
113348339fc324516cbac122d2c4bb16.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
113348339fc324516cbac122d2c4bb16.exe
Resource
win10v2004-20231215-en
General
-
Target
113348339fc324516cbac122d2c4bb16.exe
-
Size
385KB
-
MD5
113348339fc324516cbac122d2c4bb16
-
SHA1
c60de8efefe63a5014fa006aab89192128b138aa
-
SHA256
05bc92f953cf9e0b6c79a2bb05bf5f2b3336ae959d964fbdfffd2f84a848400e
-
SHA512
228aaf30708da2b9289621addea4bc69625043675dfd712cd8b5ed7e3c1f7c5d09468fa28a09e8a6377ae06c4256b04203912159e994350aaa5a48feb3f5c398
-
SSDEEP
6144:7aANB7dV+QSfUQUOS1ztMGwwZhGaDWjDsFSdoFGZJ2nlKNbCB:eANBaUO2MxrsDFxlsCB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1428 113348339fc324516cbac122d2c4bb16.exe -
Executes dropped EXE 1 IoCs
pid Process 1428 113348339fc324516cbac122d2c4bb16.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 496 113348339fc324516cbac122d2c4bb16.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 496 113348339fc324516cbac122d2c4bb16.exe 1428 113348339fc324516cbac122d2c4bb16.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 496 wrote to memory of 1428 496 113348339fc324516cbac122d2c4bb16.exe 61 PID 496 wrote to memory of 1428 496 113348339fc324516cbac122d2c4bb16.exe 61 PID 496 wrote to memory of 1428 496 113348339fc324516cbac122d2c4bb16.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\113348339fc324516cbac122d2c4bb16.exe"C:\Users\Admin\AppData\Local\Temp\113348339fc324516cbac122d2c4bb16.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Users\Admin\AppData\Local\Temp\113348339fc324516cbac122d2c4bb16.exeC:\Users\Admin\AppData\Local\Temp\113348339fc324516cbac122d2c4bb16.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5ed75f981e9386db8b85cd2883f2f2a31
SHA1ea5a58bdef810d573171d7c9aa58f46e734d121d
SHA25684bc182725bac42972570805a56a3075b85006f50f8a7e9748808c2e2171844d
SHA51261d5b1243b8404c0fb78b3e55af1aad499de04f8f24b5634934d3c622ae80f027651d4a79bd90e3b810f4faf5303461cf28bd4d376f3e7682be0b81d62d4c3bc