Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:11
Static task
static1
Behavioral task
behavioral1
Sample
157b13e5cc30a15e600ed4c0f4891249.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
157b13e5cc30a15e600ed4c0f4891249.exe
Resource
win10v2004-20231215-en
General
-
Target
157b13e5cc30a15e600ed4c0f4891249.exe
-
Size
385KB
-
MD5
157b13e5cc30a15e600ed4c0f4891249
-
SHA1
8b2cdd9399e773236427b3dde2e30f84a9343a59
-
SHA256
371f5e03d525ff6d1a14dc69a477a8de95f94c37aa1eca65cefe5e3be81877ba
-
SHA512
c0c4e6417c0ad29554f0a64a49b8f198795fcdf4dd5da9b7f8b8d1d88e949a3a20ee5fc088610aca797ced10bdff5c20f7a0b8691a34fcdb6ea7ecdaeed7911f
-
SSDEEP
6144:fj4QpzgIr6m5+vCsAZ0OzEYPMBmaYcEMgcVo9kLfuhSxpaNZc0Ui0CCt6I7K2B:fjlyIrF+vCrKOzEY9jcEff4Wui0Lf5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4740 157b13e5cc30a15e600ed4c0f4891249.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 157b13e5cc30a15e600ed4c0f4891249.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4660 157b13e5cc30a15e600ed4c0f4891249.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4660 157b13e5cc30a15e600ed4c0f4891249.exe 4740 157b13e5cc30a15e600ed4c0f4891249.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4740 4660 157b13e5cc30a15e600ed4c0f4891249.exe 90 PID 4660 wrote to memory of 4740 4660 157b13e5cc30a15e600ed4c0f4891249.exe 90 PID 4660 wrote to memory of 4740 4660 157b13e5cc30a15e600ed4c0f4891249.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\157b13e5cc30a15e600ed4c0f4891249.exe"C:\Users\Admin\AppData\Local\Temp\157b13e5cc30a15e600ed4c0f4891249.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\157b13e5cc30a15e600ed4c0f4891249.exeC:\Users\Admin\AppData\Local\Temp\157b13e5cc30a15e600ed4c0f4891249.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD53036343ffd1f744978a1153e650deb9e
SHA13ead61f37315d2aeed5e7a80313780762d5f916c
SHA2561b1a3586db00e5b4f886698e7243eb344367c1cb47f3d7751245572eb5a4771d
SHA51273db1918a9ad9b7a75d5e4fc7c46b3cb0f6af513ee0ea4480786a114c892b2818fd571c2cc701f04cb103edeb0e9264ec44751912fc5623f88c0cbdc48b682ff