Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
369c704d9dba4db51998ae9476d35457.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
369c704d9dba4db51998ae9476d35457.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
369c704d9dba4db51998ae9476d35457.exe
-
Size
771KB
-
MD5
369c704d9dba4db51998ae9476d35457
-
SHA1
66fad780c4966e0be62df9ffc63a754540818a91
-
SHA256
ea2d52e484d3503420713799027435a3707862bd6417f0a4c02d9366b7a86265
-
SHA512
9050e679e39dcd70bc7886584b5afba7f15cbcdc7c3e353e22cda21ee5c814e098cc6297e46cc21fe0c54da66eeae6bc4b5bace88ff759cb491b3920f25a3cca
-
SSDEEP
24576:EzA7R9LCXuxS4YEzb10hJaothZ2/T6FBBB:ECuXud/ofT
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3564 369c704d9dba4db51998ae9476d35457.exe -
Executes dropped EXE 1 IoCs
pid Process 3564 369c704d9dba4db51998ae9476d35457.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4416 369c704d9dba4db51998ae9476d35457.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4416 369c704d9dba4db51998ae9476d35457.exe 3564 369c704d9dba4db51998ae9476d35457.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3564 4416 369c704d9dba4db51998ae9476d35457.exe 16 PID 4416 wrote to memory of 3564 4416 369c704d9dba4db51998ae9476d35457.exe 16 PID 4416 wrote to memory of 3564 4416 369c704d9dba4db51998ae9476d35457.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\369c704d9dba4db51998ae9476d35457.exe"C:\Users\Admin\AppData\Local\Temp\369c704d9dba4db51998ae9476d35457.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\369c704d9dba4db51998ae9476d35457.exeC:\Users\Admin\AppData\Local\Temp\369c704d9dba4db51998ae9476d35457.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3564
-