Analysis

  • max time kernel
    146s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 05:23

General

  • Target

    29d9f6c39677d3d949b22a27e736e85c.exe

  • Size

    385KB

  • MD5

    29d9f6c39677d3d949b22a27e736e85c

  • SHA1

    57a902d9b03282bdf87f7230cd72357ff03bdd0d

  • SHA256

    645c111d64ef8d8e06966b4ce9333d6ca5c91819a6bb8779b5df581203653a4d

  • SHA512

    e2af483d06d7ccee0c4565a54168b3d8ca53ffbe83f1c1c99e70a15dd2bc2a822dd20772e93a01bc04b6258d118da4a1156f99ad98aa917fe24e82b9d66887e6

  • SSDEEP

    6144:ry8P5SL5MszYsQgBwR2I4mYIFHhSFiVa30pTC9s8z2nlSjW9gXixmjKRzZo4toUB:ryWCOsMsvQ2IZzBS2uGeuBxzIjKRZvB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe
    "C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe
      C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe

    Filesize

    385KB

    MD5

    82bbe3163c8e4ac890968efa2bf3182d

    SHA1

    ee4471bc13be7bb692745588f6fa18a3524c98cb

    SHA256

    fb9aa43471c95e1a876519351ef50467d828677af775f6637272ce1db71792aa

    SHA512

    1e52804313db900e7137d7f864fbd057e8d44b8214e2a8bdfeebbb0cfc3642bcb22a86ba53eb488fe6abae61fa9e8b934b64522b18ffa5ea22b7ea9103459361

  • memory/1304-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1304-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1304-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1304-1-0x0000000001610000-0x0000000001676000-memory.dmp

    Filesize

    408KB

  • memory/1460-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1460-16-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/1460-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1460-20-0x0000000004F00000-0x0000000004F5F000-memory.dmp

    Filesize

    380KB

  • memory/1460-38-0x000000000D660000-0x000000000D69C000-memory.dmp

    Filesize

    240KB

  • memory/1460-37-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1460-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB