Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
1bceae1cbca1be2e1870489a726042eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bceae1cbca1be2e1870489a726042eb.exe
Resource
win10v2004-20231215-en
General
-
Target
1bceae1cbca1be2e1870489a726042eb.exe
-
Size
385KB
-
MD5
1bceae1cbca1be2e1870489a726042eb
-
SHA1
4f1e1c7aaf3a3e888a5b8acfde37f365cd33fd38
-
SHA256
2e3387531017e012a5cd79d3f21321bae7a79a76f50d1956d2b7447130035353
-
SHA512
9fe0a5d696885bc0010a501592d6696791f81b1a81d35824eb421da7b55d1b5ea26637b32dc37773334d9bd6c98ae52b7186c48265ed452ea6b002aef0533ad2
-
SSDEEP
12288:RZ9wRya+XWKb/9p5fVze13J1vvmJigviRMB:bU+XRppHm3LR+B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3224 1bceae1cbca1be2e1870489a726042eb.exe -
Executes dropped EXE 1 IoCs
pid Process 3224 1bceae1cbca1be2e1870489a726042eb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2600 1bceae1cbca1be2e1870489a726042eb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2600 1bceae1cbca1be2e1870489a726042eb.exe 3224 1bceae1cbca1be2e1870489a726042eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3224 2600 1bceae1cbca1be2e1870489a726042eb.exe 89 PID 2600 wrote to memory of 3224 2600 1bceae1cbca1be2e1870489a726042eb.exe 89 PID 2600 wrote to memory of 3224 2600 1bceae1cbca1be2e1870489a726042eb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bceae1cbca1be2e1870489a726042eb.exe"C:\Users\Admin\AppData\Local\Temp\1bceae1cbca1be2e1870489a726042eb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\1bceae1cbca1be2e1870489a726042eb.exeC:\Users\Admin\AppData\Local\Temp\1bceae1cbca1be2e1870489a726042eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5cae59daf626fadfe5b5330ae06d6d6ac
SHA1b7d932939189fccf41523eb4fb0218263ab0a238
SHA2563e60b6d4174a0e40f447266c4962630089f306d45b2c5a4cfa42d015f04fb9f5
SHA512e9ca2490b4208a40d7817c0f57c4da488cbeb632d7627d285bc8d25a945daac1292cab65875008e78ed6bcb11e506fe858bd5599a5eb45b4dfc563885352bad9