Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
168660fdc8db05560a418e98a8ecd9f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
168660fdc8db05560a418e98a8ecd9f0.exe
Resource
win10v2004-20231222-en
General
-
Target
168660fdc8db05560a418e98a8ecd9f0.exe
-
Size
385KB
-
MD5
168660fdc8db05560a418e98a8ecd9f0
-
SHA1
c1a9c404ec86c1cca323528e807595676bdcda3b
-
SHA256
ec54f25751fb0add36d18eceeca46bcc21896e47663389e738614d33e2bd9965
-
SHA512
5b184436277817d65392353c50f291bb0982f8b3ccf0b9fd02db77a314bd13624c81a06880c936c6adeadfb188ba119df5c5d5e84a3cc5108c717f0e4c44f220
-
SSDEEP
12288:yfG0dyVc7L0Bb+Zgg6GpAy0G4guyY7czD/+Enh/B:yfGBW740Zg7Gpf0Quz7cP+EnxB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4448 168660fdc8db05560a418e98a8ecd9f0.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 168660fdc8db05560a418e98a8ecd9f0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5008 168660fdc8db05560a418e98a8ecd9f0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5008 168660fdc8db05560a418e98a8ecd9f0.exe 4448 168660fdc8db05560a418e98a8ecd9f0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4448 5008 168660fdc8db05560a418e98a8ecd9f0.exe 18 PID 5008 wrote to memory of 4448 5008 168660fdc8db05560a418e98a8ecd9f0.exe 18 PID 5008 wrote to memory of 4448 5008 168660fdc8db05560a418e98a8ecd9f0.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\168660fdc8db05560a418e98a8ecd9f0.exe"C:\Users\Admin\AppData\Local\Temp\168660fdc8db05560a418e98a8ecd9f0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\168660fdc8db05560a418e98a8ecd9f0.exeC:\Users\Admin\AppData\Local\Temp\168660fdc8db05560a418e98a8ecd9f0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD534ed81089471716e7612046339247fab
SHA1fb9f528321f354e1f6292d75e528b1465d71e30b
SHA25633ec1fb1db4f3465552940343ee58238db1e117afa683a48498ca3411362bc5f
SHA512ce2ad97d2ffebee57f9dc81f8cd14fb2a8ccb3e17c82f7e4ff69a3ba14540e0fd40bc0476a0988179ec3e5ae095bec4a84c36ff7af25d4815c2a431e31d5bf9f