Analysis
-
max time kernel
140s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
12b4e85e9cfa65ed9992a64344c9d1f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12b4e85e9cfa65ed9992a64344c9d1f9.exe
Resource
win10v2004-20231215-en
General
-
Target
12b4e85e9cfa65ed9992a64344c9d1f9.exe
-
Size
385KB
-
MD5
12b4e85e9cfa65ed9992a64344c9d1f9
-
SHA1
1e2cfcd7a42c977a74a359cc59a418fa555dc0c6
-
SHA256
8b5cc2f434fec22122746fa9aa983f7bb078fd7841c18462379fab7bfd7f4b2f
-
SHA512
751da0445ad02c8ec026e7422331443c98fce92cdbf089ff68f908f92ec25ba96c7350f1e065608730de2c4a4a092b9aae6b059cbd6db9771e224999cf573cfd
-
SSDEEP
12288:Q1Uavc7atXxNAO7khweMmKcvShxXsROcxVhu9B:Havc7aRj7khZfKcGkD6B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3688 12b4e85e9cfa65ed9992a64344c9d1f9.exe -
Executes dropped EXE 1 IoCs
pid Process 3688 12b4e85e9cfa65ed9992a64344c9d1f9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4980 12b4e85e9cfa65ed9992a64344c9d1f9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4980 12b4e85e9cfa65ed9992a64344c9d1f9.exe 3688 12b4e85e9cfa65ed9992a64344c9d1f9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 3688 4980 12b4e85e9cfa65ed9992a64344c9d1f9.exe 90 PID 4980 wrote to memory of 3688 4980 12b4e85e9cfa65ed9992a64344c9d1f9.exe 90 PID 4980 wrote to memory of 3688 4980 12b4e85e9cfa65ed9992a64344c9d1f9.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b4e85e9cfa65ed9992a64344c9d1f9.exe"C:\Users\Admin\AppData\Local\Temp\12b4e85e9cfa65ed9992a64344c9d1f9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\12b4e85e9cfa65ed9992a64344c9d1f9.exeC:\Users\Admin\AppData\Local\Temp\12b4e85e9cfa65ed9992a64344c9d1f9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52a7e3f88ba9d20bc0e6b5ab80aac48fc
SHA139fc0025d48c1a11ed6a23aed2a05009172f294b
SHA256117fd77b548f080dad0b38149b0d8e8069a2c18660e154bc1defb6615a824d98
SHA512af7d6cb5cb5bc1d76b629baa8dd56644408de06d7c06c5a4972a897c2b31e8d6098daaffdc2897cf519c6479d40ebe44f7aca7b0c35c29b0a42ff520ff4c4238