Analysis
-
max time kernel
191s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
1463ef5a8ae514f282d7f6354a23caa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1463ef5a8ae514f282d7f6354a23caa7.exe
Resource
win10v2004-20231215-en
General
-
Target
1463ef5a8ae514f282d7f6354a23caa7.exe
-
Size
385KB
-
MD5
1463ef5a8ae514f282d7f6354a23caa7
-
SHA1
f9d5cf55df189ebf446b09e0313128787918b0cb
-
SHA256
cb99f6e69cfe33adebabfd640133f6f2b08080dec950a6bb3831cd37c474acda
-
SHA512
a69fce8b8500f2fbe3c754959018b8eb303a556fc36dcf016edf5e23561cc3959a910db06fe782a25b2893508b8fc2c464c7cc79e9d3449c749ca6abba8dc46c
-
SSDEEP
6144:DmWGMuzfhFsYnIPC05KFXaMfBruJ6Y77ytHQ9gHtIr6WXH+BkSbeDvKnfjB:SWGlzf0YbC6ZuJX7ytHGWDEvKfjB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4920 1463ef5a8ae514f282d7f6354a23caa7.exe -
Executes dropped EXE 1 IoCs
pid Process 4920 1463ef5a8ae514f282d7f6354a23caa7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4060 1463ef5a8ae514f282d7f6354a23caa7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4060 1463ef5a8ae514f282d7f6354a23caa7.exe 4920 1463ef5a8ae514f282d7f6354a23caa7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4920 4060 1463ef5a8ae514f282d7f6354a23caa7.exe 91 PID 4060 wrote to memory of 4920 4060 1463ef5a8ae514f282d7f6354a23caa7.exe 91 PID 4060 wrote to memory of 4920 4060 1463ef5a8ae514f282d7f6354a23caa7.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1463ef5a8ae514f282d7f6354a23caa7.exe"C:\Users\Admin\AppData\Local\Temp\1463ef5a8ae514f282d7f6354a23caa7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\1463ef5a8ae514f282d7f6354a23caa7.exeC:\Users\Admin\AppData\Local\Temp\1463ef5a8ae514f282d7f6354a23caa7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5f5279005948cdf41ae00d21f69ef7927
SHA1837f8122e1ce34044389b590b0d1d24c0877630c
SHA2568d440794ff047b5b41efa9021b9b03f1dc96713d73be6d7b49026dc6304a2d75
SHA512173c3078afe9b74c430b150e7811d21e055e3572ab707b4c8c54454b21b077816b413d69584deed2697260a29fe66593d921af385ee429d3a7a9df03ad7b2ab6