Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
169932a9812aa8b46b8905d051628609.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
169932a9812aa8b46b8905d051628609.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
169932a9812aa8b46b8905d051628609.exe
-
Size
385KB
-
MD5
169932a9812aa8b46b8905d051628609
-
SHA1
42b37aeccdd9303366c6c7e2b588912643473640
-
SHA256
a0f84110e5528f26d32676a5a2b01bcac95ccfbd3fbebd683cf0b7c8b84a640d
-
SHA512
9cf55b5199d16c8f3a05930cc6c6c10ea014978d66dbb7b9d6e8bd56a61197e626c34d30ca8c7a5eddf037b2e65eb87092a2dfd25d9b7fde130fc615d965ca3b
-
SSDEEP
6144:CSpbiP+vKcWMYUk1bxEtp1jDz0daO8u7ICz37U3bzGQ5lQA0jB:LRigDWMU1bxEbDUf8EpzwrWB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4012 169932a9812aa8b46b8905d051628609.exe -
Executes dropped EXE 1 IoCs
pid Process 4012 169932a9812aa8b46b8905d051628609.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2608 169932a9812aa8b46b8905d051628609.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2608 169932a9812aa8b46b8905d051628609.exe 4012 169932a9812aa8b46b8905d051628609.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2608 wrote to memory of 4012 2608 169932a9812aa8b46b8905d051628609.exe 20 PID 2608 wrote to memory of 4012 2608 169932a9812aa8b46b8905d051628609.exe 20 PID 2608 wrote to memory of 4012 2608 169932a9812aa8b46b8905d051628609.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\169932a9812aa8b46b8905d051628609.exe"C:\Users\Admin\AppData\Local\Temp\169932a9812aa8b46b8905d051628609.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\169932a9812aa8b46b8905d051628609.exeC:\Users\Admin\AppData\Local\Temp\169932a9812aa8b46b8905d051628609.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4012
-