Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
23a8618ca596037ed7814f9381d58c19.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23a8618ca596037ed7814f9381d58c19.exe
Resource
win10v2004-20231215-en
General
-
Target
23a8618ca596037ed7814f9381d58c19.exe
-
Size
385KB
-
MD5
23a8618ca596037ed7814f9381d58c19
-
SHA1
ac70f68a58ef20ef1793d85cdd0ef3db9ba8010d
-
SHA256
3f530c057aebc5ee4550e2d6299030fdf07feb42406dd4c37acf9ee9fa19221a
-
SHA512
02236b86969ac087ed7b4156aef04e18dcdcea99134de742c3a2c44989171f9f575fc72092ce73a32e6ea73eadd3ab07cd632d071b33ac97089bcfbc0583f405
-
SSDEEP
6144:670xTF/tnnSuodgzxQQVz7mF0l27vzoS5XvUOVEBPNtZkDXrzB:9xJ1nnRo0GF0Cvn5XMXT2XrzB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2056 23a8618ca596037ed7814f9381d58c19.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 23a8618ca596037ed7814f9381d58c19.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1688 23a8618ca596037ed7814f9381d58c19.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1688 23a8618ca596037ed7814f9381d58c19.exe 2056 23a8618ca596037ed7814f9381d58c19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2056 1688 23a8618ca596037ed7814f9381d58c19.exe 18 PID 1688 wrote to memory of 2056 1688 23a8618ca596037ed7814f9381d58c19.exe 18 PID 1688 wrote to memory of 2056 1688 23a8618ca596037ed7814f9381d58c19.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe"C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exeC:\Users\Admin\AppData\Local\Temp\23a8618ca596037ed7814f9381d58c19.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f5efee3eb1d0ae93b82fa824de72937a
SHA12b10e974c7a9a37efb66e4c379ab5c8687c4b263
SHA256ea9c0f012e057b07cef88b2dad8f33080173be68da0c087536458cebc28b3864
SHA51276ec062a49d5869b69805e26524f801191c27052c2fb953870d24b63dcb8aecd80e0c5e7b5c3248c0a53304a6039054179503e78ca274178b1d457caa54909c2