Analysis
-
max time kernel
137s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
2790d5583c362df230daa8ece9cc77d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2790d5583c362df230daa8ece9cc77d3.exe
Resource
win10v2004-20231215-en
General
-
Target
2790d5583c362df230daa8ece9cc77d3.exe
-
Size
385KB
-
MD5
2790d5583c362df230daa8ece9cc77d3
-
SHA1
2e8e3a4c8b8dc9acc5058499a66e2cd003bc70ad
-
SHA256
7fa14faa0a3bbf0f0daad20a5525e04e6c7f1bc5d2168d26395566dc4d315754
-
SHA512
32177a426204c9fdecd7e68fbe12ba32975028b5b9c79b7289020d989957250e4be58bf3deb6c2c1d7067080cb7b4e5cae669c631bdea3494a63d4a433f2bd4f
-
SSDEEP
6144:c9ZjPSb0PQouvvePx5wO3R56WYtzlY8mzh09MrUMA4RDgAMSKCB:Gpk0PQPvvePvR56WOZYzzupoRDgaKCB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 440 2790d5583c362df230daa8ece9cc77d3.exe -
Executes dropped EXE 1 IoCs
pid Process 440 2790d5583c362df230daa8ece9cc77d3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 2790d5583c362df230daa8ece9cc77d3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 2790d5583c362df230daa8ece9cc77d3.exe 440 2790d5583c362df230daa8ece9cc77d3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 440 2084 2790d5583c362df230daa8ece9cc77d3.exe 93 PID 2084 wrote to memory of 440 2084 2790d5583c362df230daa8ece9cc77d3.exe 93 PID 2084 wrote to memory of 440 2084 2790d5583c362df230daa8ece9cc77d3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2790d5583c362df230daa8ece9cc77d3.exe"C:\Users\Admin\AppData\Local\Temp\2790d5583c362df230daa8ece9cc77d3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\2790d5583c362df230daa8ece9cc77d3.exeC:\Users\Admin\AppData\Local\Temp\2790d5583c362df230daa8ece9cc77d3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a08f1fd735a7ce71980255be4bd733f1
SHA117696d8916e3eb6ecb91f2218f55a20a97441b38
SHA256129cdd2e640a748d03db9fa3ec931a2be1ca3dffc4bbc2c72512eaae73e57bb0
SHA512fb07b4eb103d72b84b491dc48ab2d4335f32ac16599efcf2fc9d7563ae3c490223e5ec63204b9a733407d8eb2fbd26a382aa453bb7a23653f898ef81d6aaae54