Analysis
-
max time kernel
146s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:53
Static task
static1
Behavioral task
behavioral1
Sample
23792614725d474b19cf580fb12c7129.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23792614725d474b19cf580fb12c7129.exe
Resource
win10v2004-20231215-en
General
-
Target
23792614725d474b19cf580fb12c7129.exe
-
Size
385KB
-
MD5
23792614725d474b19cf580fb12c7129
-
SHA1
3f8e9bf15fc31c4a1d16f0902cfb70c6be1917c2
-
SHA256
4e8ec4961e1441f6b5c17da3c88076156d9b32044ef797c80ef3fd62674b3fd0
-
SHA512
0f647b9ef151046f87e8b6839aa5101c17d4244019f7b29a1da747a840b6303366865811b0417a656c7dd872fea23fdd957e79d3976b53d2371ee29b339311d9
-
SSDEEP
6144:kzX+MeCzXWZaEQZC4P86goKSyA0avlBkNAB2EyMIlojgUuZtxrZQSdxHB:oumCpQ44hghBAdvlBkNAgEwoj2Ztxr/B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1900 23792614725d474b19cf580fb12c7129.exe -
Executes dropped EXE 1 IoCs
pid Process 1900 23792614725d474b19cf580fb12c7129.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 23792614725d474b19cf580fb12c7129.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2808 23792614725d474b19cf580fb12c7129.exe 1900 23792614725d474b19cf580fb12c7129.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1900 2808 23792614725d474b19cf580fb12c7129.exe 88 PID 2808 wrote to memory of 1900 2808 23792614725d474b19cf580fb12c7129.exe 88 PID 2808 wrote to memory of 1900 2808 23792614725d474b19cf580fb12c7129.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\23792614725d474b19cf580fb12c7129.exe"C:\Users\Admin\AppData\Local\Temp\23792614725d474b19cf580fb12c7129.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\23792614725d474b19cf580fb12c7129.exeC:\Users\Admin\AppData\Local\Temp\23792614725d474b19cf580fb12c7129.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e3bac9474deaa0d7d0c33996c34ad105
SHA1c2646a02180b1e6e6229eec8cfa49cac2c38485d
SHA2567e4b668360341bc01a1f7455d9c431a18b25cc56c9480a1788d4bc04d320dc10
SHA5120cb2e981f6f4d432befebdc89c741ee809b7d14bf0c703f3a338d744a6109ac5892999c616a51a44c8089cc63754e0cce2f7665bfad904d0894850046a063485