Analysis
-
max time kernel
141s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:56
Static task
static1
Behavioral task
behavioral1
Sample
22597a63f41ed1ee48be6e38596a8312.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22597a63f41ed1ee48be6e38596a8312.exe
Resource
win10v2004-20231215-en
General
-
Target
22597a63f41ed1ee48be6e38596a8312.exe
-
Size
385KB
-
MD5
22597a63f41ed1ee48be6e38596a8312
-
SHA1
394c25b8bbe0895f082f8c445b1b840f8c47113a
-
SHA256
81980677d5899b1229417a23fc002ef7f2cf1ea9f0d3788e0368e3104d8a3e29
-
SHA512
d4f3d27611c5f70f9e42d0bd4c56eb29e20c9fffec5377799df48a770edebebe068bfbf22b3e3ce103a17d5cd96b79f3df1cb1334051e42c7ccdf27b3c40e68e
-
SSDEEP
6144:GJNEq4kAz5jDt64kqM+TIUOK3KEDHHBduqtrU7u5ah3fnXfMq2Sxu2+htDQgDB:GTEqfijhBkUWK3KETHvuJfXEAqt8eB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4636 22597a63f41ed1ee48be6e38596a8312.exe -
Executes dropped EXE 1 IoCs
pid Process 4636 22597a63f41ed1ee48be6e38596a8312.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3560 22597a63f41ed1ee48be6e38596a8312.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3560 22597a63f41ed1ee48be6e38596a8312.exe 4636 22597a63f41ed1ee48be6e38596a8312.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 4636 3560 22597a63f41ed1ee48be6e38596a8312.exe 90 PID 3560 wrote to memory of 4636 3560 22597a63f41ed1ee48be6e38596a8312.exe 90 PID 3560 wrote to memory of 4636 3560 22597a63f41ed1ee48be6e38596a8312.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\22597a63f41ed1ee48be6e38596a8312.exe"C:\Users\Admin\AppData\Local\Temp\22597a63f41ed1ee48be6e38596a8312.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\22597a63f41ed1ee48be6e38596a8312.exeC:\Users\Admin\AppData\Local\Temp\22597a63f41ed1ee48be6e38596a8312.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51bb9d61ad9d0cdaf390cbf8bd42414c6
SHA13c2a532f1860f39b29120334983b78d746667f64
SHA25620be6fbfd53154d45dbd1adf47a593d90ba5e8507c5c85ea33e5f29b902dd132
SHA512fa30971fb0298853d9e3a6956c7652470359fe53d37451305db83810f97679cb410cd2edd4c061c12e484bf6e282fca9e0c56340bc980b5879c42ed2f4f45453