Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
1731c2e4a076fe41665d816a16c5f526.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1731c2e4a076fe41665d816a16c5f526.exe
Resource
win10v2004-20231215-en
General
-
Target
1731c2e4a076fe41665d816a16c5f526.exe
-
Size
385KB
-
MD5
1731c2e4a076fe41665d816a16c5f526
-
SHA1
e157d45c638d44872680660ddeab8055e9d6f9b9
-
SHA256
c1c8a67bcbe2e665384890f898e407d4fe2097985407e92a9f7d9a8134e91edd
-
SHA512
84225509defb95aac55a40766eed0a8ecb055eb6d07f195636c6ab64ee06b82ab003b155bf6ae81fc3156d0c19dbb50131c6dca5a8cf79ee05e602342c4a3952
-
SSDEEP
6144:K7YHLUlqHE9mXC3Fy13BsOOvAs26C9pR/m8NeVfTJ2T3F3F1ozH7Ta48B:KoYqE9mXFZ+13cRByfTQ1OH7MB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3616 1731c2e4a076fe41665d816a16c5f526.exe -
Executes dropped EXE 1 IoCs
pid Process 3616 1731c2e4a076fe41665d816a16c5f526.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 472 1731c2e4a076fe41665d816a16c5f526.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 472 1731c2e4a076fe41665d816a16c5f526.exe 3616 1731c2e4a076fe41665d816a16c5f526.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 472 wrote to memory of 3616 472 1731c2e4a076fe41665d816a16c5f526.exe 87 PID 472 wrote to memory of 3616 472 1731c2e4a076fe41665d816a16c5f526.exe 87 PID 472 wrote to memory of 3616 472 1731c2e4a076fe41665d816a16c5f526.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1731c2e4a076fe41665d816a16c5f526.exe"C:\Users\Admin\AppData\Local\Temp\1731c2e4a076fe41665d816a16c5f526.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\1731c2e4a076fe41665d816a16c5f526.exeC:\Users\Admin\AppData\Local\Temp\1731c2e4a076fe41665d816a16c5f526.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58198c32bab55e2f524d4d3e70db09f58
SHA1bd56f8e0f7bfcc04baa6340e8a496e9a6a1b89a5
SHA256e16fd3cbb74ccf36470f81a38362affae63b2edbe749cd14c947f19867cc30d6
SHA5124d804d7207110a7a3e83805d40763018570824911e7d66ad6868f7e42395834b6590d6816b23855ab4b00fee2efb50fc4a9275a059ce670672f04efdedd8fb70