Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
11cbb9da687edc62cf510d2b7fcd3869.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11cbb9da687edc62cf510d2b7fcd3869.exe
Resource
win10v2004-20231215-en
General
-
Target
11cbb9da687edc62cf510d2b7fcd3869.exe
-
Size
385KB
-
MD5
11cbb9da687edc62cf510d2b7fcd3869
-
SHA1
3381b635894238f7d4f01fe575dc08e3997d0721
-
SHA256
c920796a2e9e46693fe343ce71b6aa57b9150272769cf07420e60e01173140bc
-
SHA512
9120eb5613385482143e48b6b811c26eceae2e8176b7941f3484b847b43047b03cd5ba1c37733ebacac7fbf0c4b1213b46c3f1c8a7da1c2e5a07b2b7c1663662
-
SSDEEP
12288:xeSbgxGtlmp9n7vr8TYMEo7AiCnjMqSm9qluJB:xeSbgxkS7vreYMpDaAqSl8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3148 11cbb9da687edc62cf510d2b7fcd3869.exe -
Executes dropped EXE 1 IoCs
pid Process 3148 11cbb9da687edc62cf510d2b7fcd3869.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4436 11cbb9da687edc62cf510d2b7fcd3869.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4436 11cbb9da687edc62cf510d2b7fcd3869.exe 3148 11cbb9da687edc62cf510d2b7fcd3869.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3148 4436 11cbb9da687edc62cf510d2b7fcd3869.exe 88 PID 4436 wrote to memory of 3148 4436 11cbb9da687edc62cf510d2b7fcd3869.exe 88 PID 4436 wrote to memory of 3148 4436 11cbb9da687edc62cf510d2b7fcd3869.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\11cbb9da687edc62cf510d2b7fcd3869.exe"C:\Users\Admin\AppData\Local\Temp\11cbb9da687edc62cf510d2b7fcd3869.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\11cbb9da687edc62cf510d2b7fcd3869.exeC:\Users\Admin\AppData\Local\Temp\11cbb9da687edc62cf510d2b7fcd3869.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD504900ed64ef737b684d4a3db76d986a1
SHA10ee1ab5c295e75fc93f1e7fdc093818b4a4c2c5e
SHA25675bd575b5d1fd39ce1f8dfe3742162733d311a550679afabb966b4dd36a4f432
SHA51208ddab02e6334af5185856f07e7d97585420233bbd41fd50ae5de127df404e6eb1d45f041d1030b35112c0f8aec1fb16ab736226904f3aa216eb986a056d9461