Analysis
-
max time kernel
186s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2aa3fda62e049ce74d516a88a4616b90.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2aa3fda62e049ce74d516a88a4616b90.exe
Resource
win10v2004-20231215-en
General
-
Target
2aa3fda62e049ce74d516a88a4616b90.exe
-
Size
385KB
-
MD5
2aa3fda62e049ce74d516a88a4616b90
-
SHA1
81e8625d261d60486aa95e1b72ec77d40a0787f4
-
SHA256
3b2574466be1efefc6bff8a871ec3ce53e35d1ecb0fb4981525be44c98558296
-
SHA512
1628c8ff345f4a46dd9efe75e9e02a3878ad00fb6e05e5fc54b47d5bfb830eb846ddaee7df671771fd6d28b47cc2c29c76e1b7a416e5bcee00b3399e3223bf72
-
SSDEEP
12288:VjO/VgqjcPllVjXjSEIq4FimeyhdNJQXFDPXhKTB:ICqjQjXjSEy4mfJKD/hgB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4020 2aa3fda62e049ce74d516a88a4616b90.exe -
Executes dropped EXE 1 IoCs
pid Process 4020 2aa3fda62e049ce74d516a88a4616b90.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4756 2aa3fda62e049ce74d516a88a4616b90.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4756 2aa3fda62e049ce74d516a88a4616b90.exe 4020 2aa3fda62e049ce74d516a88a4616b90.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4020 4756 2aa3fda62e049ce74d516a88a4616b90.exe 90 PID 4756 wrote to memory of 4020 4756 2aa3fda62e049ce74d516a88a4616b90.exe 90 PID 4756 wrote to memory of 4020 4756 2aa3fda62e049ce74d516a88a4616b90.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aa3fda62e049ce74d516a88a4616b90.exe"C:\Users\Admin\AppData\Local\Temp\2aa3fda62e049ce74d516a88a4616b90.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\2aa3fda62e049ce74d516a88a4616b90.exeC:\Users\Admin\AppData\Local\Temp\2aa3fda62e049ce74d516a88a4616b90.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD59abbf1b3ef7dae5da7d479336ed3ef12
SHA1b83d2d9ee1c544d973e197d95995e5677e579256
SHA2560d56a0706cfd5551bfd2bef72549175b3bdbac4def67e3bce8a135cff3c022ce
SHA5120f121121812773dee7e6588cac217ee56968888c059dc6290349b0b3c89ee28091b688fe86c1ca2772a7d7546de9e31bbe70ad785ab19eaee6671879639ccaa1