Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
17e372cf5241a8f17b0b5b2c3baaf539.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17e372cf5241a8f17b0b5b2c3baaf539.exe
Resource
win10v2004-20231222-en
General
-
Target
17e372cf5241a8f17b0b5b2c3baaf539.exe
-
Size
385KB
-
MD5
17e372cf5241a8f17b0b5b2c3baaf539
-
SHA1
daed0e8f41f51d28fa7cc431cb562395f101548d
-
SHA256
b140d08aaf264bf76cceb4cf45235ca81d794f1b5878eea2cb209557e42cb247
-
SHA512
58c0e49b967ea67df7edc1091fb9719aa802c0f249c80531794a68ac23a4ca6f2bfff5820a5809f01e6abd35a68ed927994f1c0891ae05f8f94969748688cc53
-
SSDEEP
6144:ivZo9jMurmfzbmn+/NatKEHU1VsG6zR63b+bvJeWArEx1PcSBnALHDqFB:VDezKqNaDHCeG6zR63bCPAr6E4ArcB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3104 17e372cf5241a8f17b0b5b2c3baaf539.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 17e372cf5241a8f17b0b5b2c3baaf539.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 17e372cf5241a8f17b0b5b2c3baaf539.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4408 17e372cf5241a8f17b0b5b2c3baaf539.exe 3104 17e372cf5241a8f17b0b5b2c3baaf539.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3104 4408 17e372cf5241a8f17b0b5b2c3baaf539.exe 19 PID 4408 wrote to memory of 3104 4408 17e372cf5241a8f17b0b5b2c3baaf539.exe 19 PID 4408 wrote to memory of 3104 4408 17e372cf5241a8f17b0b5b2c3baaf539.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\17e372cf5241a8f17b0b5b2c3baaf539.exe"C:\Users\Admin\AppData\Local\Temp\17e372cf5241a8f17b0b5b2c3baaf539.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\17e372cf5241a8f17b0b5b2c3baaf539.exeC:\Users\Admin\AppData\Local\Temp\17e372cf5241a8f17b0b5b2c3baaf539.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e4731d97ee5357eb4af0bce8258d1372
SHA1a13cc74ed8bacc6b0b5d7c29a152c3ccf400c7bc
SHA256979169aaee61eaa19db5f8bfa623e5beaa7c2f90b5c6d6b6b137cfff0ccb5a48
SHA5124e49b30b1dadf631449baab3db8a43361d99dee799a61b660739191320c2e9777295e24dd81c2a21b29a04eece67f5db5e201675becd1918eda2ac3f81a84145