Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
1a01de0fdd7510ecc99c229df2942254.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a01de0fdd7510ecc99c229df2942254.exe
Resource
win10v2004-20231215-en
General
-
Target
1a01de0fdd7510ecc99c229df2942254.exe
-
Size
385KB
-
MD5
1a01de0fdd7510ecc99c229df2942254
-
SHA1
5d9f8019ebdf38a4790b6de840a94f4aee4df09a
-
SHA256
3142f8cebf34579b9dba91ced90391b0d4ab3dd17fd438ab2f3869580d9b6a31
-
SHA512
f64d8aecf159523d68f13fbf47efd2e1ed7e5bc7c12d8e81e833cace32bd3236423036e546cd0373efcf9fadc74db7e34b0a13652d540079d3648c8386c00542
-
SSDEEP
12288:TNji4XDHhGw5RQVM0xrV5t40+pLNnn4rtOHdbwyBtzkgB:TNP3RQ/x555+fnn4ESy34gB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5000 1a01de0fdd7510ecc99c229df2942254.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 1a01de0fdd7510ecc99c229df2942254.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2356 1a01de0fdd7510ecc99c229df2942254.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2356 1a01de0fdd7510ecc99c229df2942254.exe 5000 1a01de0fdd7510ecc99c229df2942254.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 5000 2356 1a01de0fdd7510ecc99c229df2942254.exe 89 PID 2356 wrote to memory of 5000 2356 1a01de0fdd7510ecc99c229df2942254.exe 89 PID 2356 wrote to memory of 5000 2356 1a01de0fdd7510ecc99c229df2942254.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a01de0fdd7510ecc99c229df2942254.exe"C:\Users\Admin\AppData\Local\Temp\1a01de0fdd7510ecc99c229df2942254.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\1a01de0fdd7510ecc99c229df2942254.exeC:\Users\Admin\AppData\Local\Temp\1a01de0fdd7510ecc99c229df2942254.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD576d6b08fb90afe99cf7a1aeaca143c25
SHA1bf47ae4ed2da086352d19b94a78733c8157f7bdd
SHA2567c1aababb3c4a94de70362aed90893513cbbfe01b5b060e457edb43ac851385a
SHA512fa55091ce1208336bdb0c3050688e6ecb7a6d343bde2498d16b6226b93d26578fae3d644867ffdd01023b75fbfa79ae88137a653bee3c6ef643866a011d141a4