Analysis
-
max time kernel
146s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
29d9f6c39677d3d949b22a27e736e85c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29d9f6c39677d3d949b22a27e736e85c.exe
Resource
win10v2004-20231215-en
General
-
Target
29d9f6c39677d3d949b22a27e736e85c.exe
-
Size
385KB
-
MD5
29d9f6c39677d3d949b22a27e736e85c
-
SHA1
57a902d9b03282bdf87f7230cd72357ff03bdd0d
-
SHA256
645c111d64ef8d8e06966b4ce9333d6ca5c91819a6bb8779b5df581203653a4d
-
SHA512
e2af483d06d7ccee0c4565a54168b3d8ca53ffbe83f1c1c99e70a15dd2bc2a822dd20772e93a01bc04b6258d118da4a1156f99ad98aa917fe24e82b9d66887e6
-
SSDEEP
6144:ry8P5SL5MszYsQgBwR2I4mYIFHhSFiVa30pTC9s8z2nlSjW9gXixmjKRzZo4toUB:ryWCOsMsvQ2IZzBS2uGeuBxzIjKRZvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1460 29d9f6c39677d3d949b22a27e736e85c.exe -
Executes dropped EXE 1 IoCs
pid Process 1460 29d9f6c39677d3d949b22a27e736e85c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1304 29d9f6c39677d3d949b22a27e736e85c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1304 29d9f6c39677d3d949b22a27e736e85c.exe 1460 29d9f6c39677d3d949b22a27e736e85c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1460 1304 29d9f6c39677d3d949b22a27e736e85c.exe 89 PID 1304 wrote to memory of 1460 1304 29d9f6c39677d3d949b22a27e736e85c.exe 89 PID 1304 wrote to memory of 1460 1304 29d9f6c39677d3d949b22a27e736e85c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe"C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exeC:\Users\Admin\AppData\Local\Temp\29d9f6c39677d3d949b22a27e736e85c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD582bbe3163c8e4ac890968efa2bf3182d
SHA1ee4471bc13be7bb692745588f6fa18a3524c98cb
SHA256fb9aa43471c95e1a876519351ef50467d828677af775f6637272ce1db71792aa
SHA5121e52804313db900e7137d7f864fbd057e8d44b8214e2a8bdfeebbb0cfc3642bcb22a86ba53eb488fe6abae61fa9e8b934b64522b18ffa5ea22b7ea9103459361