Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
1aa7a5bfe0a5ec7309d022ed52a5a488.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1aa7a5bfe0a5ec7309d022ed52a5a488.exe
Resource
win10v2004-20231215-en
General
-
Target
1aa7a5bfe0a5ec7309d022ed52a5a488.exe
-
Size
385KB
-
MD5
1aa7a5bfe0a5ec7309d022ed52a5a488
-
SHA1
206966475f49a260b07f3184cf8451155976ddcd
-
SHA256
97d8bc270de817e8c63b3f66c007ebabf5cda53f1a749919b6dba8850dcdfbf7
-
SHA512
2ba417c71cfdbff3cf56830e3cb29c35eeaff5908a5ef4b1580d62a24954a272f8d1975e07376edeadac03a8f6dab75c368926b5ed082608bb1ce4412c78fcf7
-
SSDEEP
6144:JqQUXtBx5kXoVEC2gDmso6qjrpvl4QqREiB/h+/jnHEH56CnbQoiE0l0WTB:kb5woaQCjJqRB+rHEZ6wQG8TB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 508 1aa7a5bfe0a5ec7309d022ed52a5a488.exe -
Executes dropped EXE 1 IoCs
pid Process 508 1aa7a5bfe0a5ec7309d022ed52a5a488.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3364 1aa7a5bfe0a5ec7309d022ed52a5a488.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3364 1aa7a5bfe0a5ec7309d022ed52a5a488.exe 508 1aa7a5bfe0a5ec7309d022ed52a5a488.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 508 3364 1aa7a5bfe0a5ec7309d022ed52a5a488.exe 88 PID 3364 wrote to memory of 508 3364 1aa7a5bfe0a5ec7309d022ed52a5a488.exe 88 PID 3364 wrote to memory of 508 3364 1aa7a5bfe0a5ec7309d022ed52a5a488.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa7a5bfe0a5ec7309d022ed52a5a488.exe"C:\Users\Admin\AppData\Local\Temp\1aa7a5bfe0a5ec7309d022ed52a5a488.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\1aa7a5bfe0a5ec7309d022ed52a5a488.exeC:\Users\Admin\AppData\Local\Temp\1aa7a5bfe0a5ec7309d022ed52a5a488.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD592ebe6080eee7d1071484e9cd41668d4
SHA10344055b31313cb40f6e2ba656076db56dc5fddb
SHA256feb94e7f15dbf2e85929cdfcd3c06e56e4933f94d362715d864cc5a0d34bf531
SHA512f64245ef741bb1d9ad4a7c74fc506d17d8a7d258a36f9fe5a3dacb09d72f2ff8320a884c14ad378efcb1bce40d9c3eb824ad77b5537191091003cb6a39975bfa