Analysis
-
max time kernel
140s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
16142201dc8919ae26f6d310b34064f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16142201dc8919ae26f6d310b34064f9.exe
Resource
win10v2004-20231215-en
General
-
Target
16142201dc8919ae26f6d310b34064f9.exe
-
Size
771KB
-
MD5
16142201dc8919ae26f6d310b34064f9
-
SHA1
7c0cb0f3dc5d722dd5c2e8ef05be2551419affe1
-
SHA256
9f2c80103998eab904764ad25ad110183081def1c3099c19ab55041eae97c3eb
-
SHA512
41c2861784d10416ba5ba6d33e6ce523bf8d5dac8ec72257acde892ff3bdf2a7a7a8d4c4243cff5422e125e584d9664f11c89676deca88f544dcab33776557f0
-
SSDEEP
24576:rkW+ExZ+/F7Znn4C1b10hJaothZ2/T6FBBB:odNL5/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1728 16142201dc8919ae26f6d310b34064f9.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 16142201dc8919ae26f6d310b34064f9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3112 16142201dc8919ae26f6d310b34064f9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3112 16142201dc8919ae26f6d310b34064f9.exe 1728 16142201dc8919ae26f6d310b34064f9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1728 3112 16142201dc8919ae26f6d310b34064f9.exe 89 PID 3112 wrote to memory of 1728 3112 16142201dc8919ae26f6d310b34064f9.exe 89 PID 3112 wrote to memory of 1728 3112 16142201dc8919ae26f6d310b34064f9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\16142201dc8919ae26f6d310b34064f9.exe"C:\Users\Admin\AppData\Local\Temp\16142201dc8919ae26f6d310b34064f9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\16142201dc8919ae26f6d310b34064f9.exeC:\Users\Admin\AppData\Local\Temp\16142201dc8919ae26f6d310b34064f9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD57f12384a41ec43159b2671eb2e0e16cf
SHA1d7fb6d15f0d83a375c30244e5ec1aad1e5a77507
SHA25648074883f6fb835ac7a3ef46224984e7d5e26fa5630f17373370d0db89b54a77
SHA51263fc317e37e5d60d6614533fdb12044947f13f00900afb9c2f7d7433bf7c13a73c101e78dfd997d00a06aeab582eb1cb8dde8fa69fe34642b8dd05632fda357c