Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1cc37699fac860c9cdfcdf45fee9cfc6.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cc37699fac860c9cdfcdf45fee9cfc6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1cc37699fac860c9cdfcdf45fee9cfc6.exe
-
Size
385KB
-
MD5
1cc37699fac860c9cdfcdf45fee9cfc6
-
SHA1
030517ac0d37d087c40d680c28ffc1609e8d8765
-
SHA256
bf212441cf1bee1456083dd60a92fa50c013919e9726ad3e20813b0e92efba95
-
SHA512
f58ce707ee11988dd61fd941ef7cebacff2c95cb758da7835ff3d95c4b3d51d2421fdf86107a2462f054a4d555069e400da46c42e44638b7f93d177f7da6a4d1
-
SSDEEP
6144:bt3zcMjalGMzFrALnaAhL5b5ngfS3PlwA6ijeQs/t1jZS1g7tAbjj6B:bt3zcMjazFXABj3WA6ijed/5U+0mB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4992 1cc37699fac860c9cdfcdf45fee9cfc6.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 1cc37699fac860c9cdfcdf45fee9cfc6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3108 1cc37699fac860c9cdfcdf45fee9cfc6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3108 1cc37699fac860c9cdfcdf45fee9cfc6.exe 4992 1cc37699fac860c9cdfcdf45fee9cfc6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4992 3108 1cc37699fac860c9cdfcdf45fee9cfc6.exe 15 PID 3108 wrote to memory of 4992 3108 1cc37699fac860c9cdfcdf45fee9cfc6.exe 15 PID 3108 wrote to memory of 4992 3108 1cc37699fac860c9cdfcdf45fee9cfc6.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cc37699fac860c9cdfcdf45fee9cfc6.exe"C:\Users\Admin\AppData\Local\Temp\1cc37699fac860c9cdfcdf45fee9cfc6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\1cc37699fac860c9cdfcdf45fee9cfc6.exeC:\Users\Admin\AppData\Local\Temp\1cc37699fac860c9cdfcdf45fee9cfc6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4992
-