Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1aa4d5c516211f7ec083bf2ecffcf52f.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1aa4d5c516211f7ec083bf2ecffcf52f.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
1aa4d5c516211f7ec083bf2ecffcf52f.exe
-
Size
385KB
-
MD5
1aa4d5c516211f7ec083bf2ecffcf52f
-
SHA1
67a9983b2df7c3c91f8c49fa327bbf907fb3eafc
-
SHA256
a9eb590a7a5cca5df12ab253d7225cf43a0874858ac89374ba2f2e656b2c14ef
-
SHA512
cb555c5020862d6124ccf51365456906787287aef5aa6c2b7050a63275c0f56dee69c8773687a6b302520bfed4198cf976f904158df579bedef9bb93514b5fd1
-
SSDEEP
6144:TVTbAU2C+EI+PLjMKAJzijIUq7CvdtZUSS8k+x3+rEOXDvHYeHcUQqhQ4fgCBVZB:TVTbAbEIww9JO62vdtZaICDfYJVqpVZB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3228 1aa4d5c516211f7ec083bf2ecffcf52f.exe -
Executes dropped EXE 1 IoCs
pid Process 3228 1aa4d5c516211f7ec083bf2ecffcf52f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2608 1aa4d5c516211f7ec083bf2ecffcf52f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2608 1aa4d5c516211f7ec083bf2ecffcf52f.exe 3228 1aa4d5c516211f7ec083bf2ecffcf52f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3228 2608 1aa4d5c516211f7ec083bf2ecffcf52f.exe 19 PID 2608 wrote to memory of 3228 2608 1aa4d5c516211f7ec083bf2ecffcf52f.exe 19 PID 2608 wrote to memory of 3228 2608 1aa4d5c516211f7ec083bf2ecffcf52f.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa4d5c516211f7ec083bf2ecffcf52f.exe"C:\Users\Admin\AppData\Local\Temp\1aa4d5c516211f7ec083bf2ecffcf52f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\1aa4d5c516211f7ec083bf2ecffcf52f.exeC:\Users\Admin\AppData\Local\Temp\1aa4d5c516211f7ec083bf2ecffcf52f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3228
-