Analysis
-
max time kernel
203s -
max time network
225s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
1cad4deae161bc7a2fd1a80a49f92758.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cad4deae161bc7a2fd1a80a49f92758.exe
Resource
win10v2004-20231215-en
General
-
Target
1cad4deae161bc7a2fd1a80a49f92758.exe
-
Size
907KB
-
MD5
1cad4deae161bc7a2fd1a80a49f92758
-
SHA1
131983ca8416c931d1f3fd20350f8f4edd213099
-
SHA256
e4a6d5144bbce52f075c573049032301e5ee3d8f7b6554efc37047b8b1390e3d
-
SHA512
ad280076cecbef8148c7b68fd2dd217ee5bbc4684414d146f5c2cd5b2b0be2366c50cf6b1d4fdf1286b637d3d5cd48e6abd971619fde8db683e2486c2637d9b1
-
SSDEEP
24576:XVhrtfbw9wSEnZz/8SQU/kHNy47MdpjldFa/ZS1:lhrdwySEnJC3y4QjldFgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3552 1cad4deae161bc7a2fd1a80a49f92758.exe -
Executes dropped EXE 1 IoCs
pid Process 3552 1cad4deae161bc7a2fd1a80a49f92758.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 748 1cad4deae161bc7a2fd1a80a49f92758.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 748 1cad4deae161bc7a2fd1a80a49f92758.exe 3552 1cad4deae161bc7a2fd1a80a49f92758.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 748 wrote to memory of 3552 748 1cad4deae161bc7a2fd1a80a49f92758.exe 91 PID 748 wrote to memory of 3552 748 1cad4deae161bc7a2fd1a80a49f92758.exe 91 PID 748 wrote to memory of 3552 748 1cad4deae161bc7a2fd1a80a49f92758.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cad4deae161bc7a2fd1a80a49f92758.exe"C:\Users\Admin\AppData\Local\Temp\1cad4deae161bc7a2fd1a80a49f92758.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\1cad4deae161bc7a2fd1a80a49f92758.exeC:\Users\Admin\AppData\Local\Temp\1cad4deae161bc7a2fd1a80a49f92758.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5e528eddbcd0aa5b782d719490241bb99
SHA19fbba5ca3fd30eb527d52d88ce1d43557656f615
SHA2562050b75506c9aecc131022e63f6d7284104f73f245ebd8623dc9f628314493a6
SHA5123e6a83b9b281b6c206fd458599b7c3038c855743c0a8287fe88a8f94f9fb2a437416708af9e0a80b1b5afc5f05ab0848d355804cfa71a75d6e7ad02f9f1ea74d