Analysis
-
max time kernel
168s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
25cb345a75f42edb09c0fb97781b7808.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25cb345a75f42edb09c0fb97781b7808.exe
Resource
win10v2004-20231215-en
General
-
Target
25cb345a75f42edb09c0fb97781b7808.exe
-
Size
385KB
-
MD5
25cb345a75f42edb09c0fb97781b7808
-
SHA1
776f74a4f16d2240c9a87cd1b5c9740859b1a6d2
-
SHA256
92872ee12d8109a893874e9eb3da8e9249e2faa735fa55edab3c8a5fa3515e49
-
SHA512
488ef8739183777eed0069d2d29721b711bd2ff225cd4173f698aa907e600855bca1c58f27a220b7f7f3bb2d6ac27dacedbc0d82f230f2893ecb33e2004ab9ec
-
SSDEEP
6144:8UhmkrP3KUK56KAlL9AI4SMSNYDm7N1ffxbq+J1ihcrOgjjF1MXzpYB:BpLSAPMSNYDmrfQMVr1jjFejpYB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 25cb345a75f42edb09c0fb97781b7808.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 25cb345a75f42edb09c0fb97781b7808.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4716 25cb345a75f42edb09c0fb97781b7808.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4716 25cb345a75f42edb09c0fb97781b7808.exe 3044 25cb345a75f42edb09c0fb97781b7808.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3044 4716 25cb345a75f42edb09c0fb97781b7808.exe 91 PID 4716 wrote to memory of 3044 4716 25cb345a75f42edb09c0fb97781b7808.exe 91 PID 4716 wrote to memory of 3044 4716 25cb345a75f42edb09c0fb97781b7808.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\25cb345a75f42edb09c0fb97781b7808.exe"C:\Users\Admin\AppData\Local\Temp\25cb345a75f42edb09c0fb97781b7808.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\25cb345a75f42edb09c0fb97781b7808.exeC:\Users\Admin\AppData\Local\Temp\25cb345a75f42edb09c0fb97781b7808.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51745ece572decefe81e64b238fa9a88e
SHA157b9afd2362f20390f57d0de0764f8e526714f0e
SHA256c187806eac2d94d6c9236681701ccaff0d8e06dabf99719d7be505f7df7e8f61
SHA5120eeefc03e0e2a29d31ed07a52257164e0b2d9fc65ac74f743271f7645c9189ee6eebe4b1dabb9c44a86f16cbffa94283c4b66acd80da31798b3bb88b1a1772bc