Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
18e34fcb41b2e11eaaca77e0509667dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18e34fcb41b2e11eaaca77e0509667dd.exe
Resource
win10v2004-20231215-en
General
-
Target
18e34fcb41b2e11eaaca77e0509667dd.exe
-
Size
385KB
-
MD5
18e34fcb41b2e11eaaca77e0509667dd
-
SHA1
d4bb78d3803fbb6ce5651e78b55e184ffd71578a
-
SHA256
16b22bbdb6ef215b69a938f4b2c13a831de28ff28bb292f55711accd5f4804ad
-
SHA512
63cb5abbbcdfa410648e30dd550f9ac715d0d36c1e5e06df5b39bb97e3266f15e71a4b3cd304183a896a6d0d8138a4f8c68047981778a4a339bfaee3b341b97e
-
SSDEEP
6144:9o3yDzoQOeHT/JQ6xtBgDo1UMG/nw9wGz9+gwd34Oow2aOTMX19DEAFHEoxzfo10:zMQ5HTxjxtBgZModtgWoFAnQS5xzfocB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1860 18e34fcb41b2e11eaaca77e0509667dd.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 18e34fcb41b2e11eaaca77e0509667dd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4700 18e34fcb41b2e11eaaca77e0509667dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4700 18e34fcb41b2e11eaaca77e0509667dd.exe 1860 18e34fcb41b2e11eaaca77e0509667dd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 1860 4700 18e34fcb41b2e11eaaca77e0509667dd.exe 90 PID 4700 wrote to memory of 1860 4700 18e34fcb41b2e11eaaca77e0509667dd.exe 90 PID 4700 wrote to memory of 1860 4700 18e34fcb41b2e11eaaca77e0509667dd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\18e34fcb41b2e11eaaca77e0509667dd.exe"C:\Users\Admin\AppData\Local\Temp\18e34fcb41b2e11eaaca77e0509667dd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\18e34fcb41b2e11eaaca77e0509667dd.exeC:\Users\Admin\AppData\Local\Temp\18e34fcb41b2e11eaaca77e0509667dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5c983e7dc1de577f9ea29df030445978b
SHA1425466d78eda9df7d6cdd123c78e73e40d78bbe7
SHA2566cc11397924e7d4bcee75d3dc8853c09c5c9ceec3f3b0536ee4b6382f7701a6f
SHA5129e7d1650c6d1dedfa53a5b1aa4d99e05688a9e3c8f9360c3ebdd39e450cbbc9ef4a9d4b5b480c1970f8bc10375496b02b3e35581956b562bd12fce00d1629a5e