Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 12:57
Static task
static1
Behavioral task
behavioral1
Sample
36f93a58940c8466cf4869f8396ed7aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f93a58940c8466cf4869f8396ed7aa.exe
Resource
win10v2004-20231215-en
General
-
Target
36f93a58940c8466cf4869f8396ed7aa.exe
-
Size
385KB
-
MD5
36f93a58940c8466cf4869f8396ed7aa
-
SHA1
d79d1a47920a9ea68e1881fb4236ae26a99d1886
-
SHA256
827249fc3cca8be52611f42b9fe677a8bd0d300b399ee5e253f461d4445c67f5
-
SHA512
ccbc5a569c55ae9efa86bd7dd67f3ad9aea7da7633c1b525f059301685611c92a28222c6e4d88a9b4161d737ec2512da50787238056ae7a6a6e974123278f6ad
-
SSDEEP
6144:zLoYovDtv9LJr8JIOAmFo546FG1jIg5MMTHuu9EsFuIGNeNRTETSS1DeGezhlB:+Ltv9LJmALFG1c+HDX3GQzETSgDJe9lB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1360 36f93a58940c8466cf4869f8396ed7aa.exe -
Executes dropped EXE 1 IoCs
pid Process 1360 36f93a58940c8466cf4869f8396ed7aa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5052 36f93a58940c8466cf4869f8396ed7aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5052 36f93a58940c8466cf4869f8396ed7aa.exe 1360 36f93a58940c8466cf4869f8396ed7aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1360 5052 36f93a58940c8466cf4869f8396ed7aa.exe 93 PID 5052 wrote to memory of 1360 5052 36f93a58940c8466cf4869f8396ed7aa.exe 93 PID 5052 wrote to memory of 1360 5052 36f93a58940c8466cf4869f8396ed7aa.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f93a58940c8466cf4869f8396ed7aa.exe"C:\Users\Admin\AppData\Local\Temp\36f93a58940c8466cf4869f8396ed7aa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\36f93a58940c8466cf4869f8396ed7aa.exeC:\Users\Admin\AppData\Local\Temp\36f93a58940c8466cf4869f8396ed7aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f52d330499d8bc74d927b61d97b919ce
SHA110d4b70c3c63a9618624a4b6223a19d3d1560ccc
SHA25618a72a25661e718fbce3db9d26de207111b7ae5b20b4943a9cf3fcd8bc28ea03
SHA51246151767a0bb2952c71f9c5d5d2e636607ec4d1184d58aceb0875e3ba8b3816a386993f156ddbd2c97308aac704485521496de0dfef8a67f4521386d29bdf638