Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
38c58bedb500054dbe848e7bbc76d69d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38c58bedb500054dbe848e7bbc76d69d.exe
Resource
win10v2004-20231215-en
General
-
Target
38c58bedb500054dbe848e7bbc76d69d.exe
-
Size
385KB
-
MD5
38c58bedb500054dbe848e7bbc76d69d
-
SHA1
db50f2524d8ff56cc36c219f088c4c2e6245db98
-
SHA256
b05fe4dfae0e633e761b382240d2755e5c59f26a0d8653f7fbaf1e20536f800a
-
SHA512
66b6b27a21cfa0162050cdec16a5ce50d787789c98102281436c79d9d5c9fc942737d5523252ecfd56f050c35b75e71e3c73da2f825829de21a88da379d131ef
-
SSDEEP
6144:yH3/qbaGmNHD8KSWnhtRd6DBVd5uxByGDEdoLFSH/1xLh5heDcp5QPbB:i3ybaGmNjPXRqVdE/sOAh3UPbB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3936 38c58bedb500054dbe848e7bbc76d69d.exe -
Executes dropped EXE 1 IoCs
pid Process 3936 38c58bedb500054dbe848e7bbc76d69d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3092 38c58bedb500054dbe848e7bbc76d69d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3092 38c58bedb500054dbe848e7bbc76d69d.exe 3936 38c58bedb500054dbe848e7bbc76d69d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3936 3092 38c58bedb500054dbe848e7bbc76d69d.exe 89 PID 3092 wrote to memory of 3936 3092 38c58bedb500054dbe848e7bbc76d69d.exe 89 PID 3092 wrote to memory of 3936 3092 38c58bedb500054dbe848e7bbc76d69d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c58bedb500054dbe848e7bbc76d69d.exe"C:\Users\Admin\AppData\Local\Temp\38c58bedb500054dbe848e7bbc76d69d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\38c58bedb500054dbe848e7bbc76d69d.exeC:\Users\Admin\AppData\Local\Temp\38c58bedb500054dbe848e7bbc76d69d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fb0bc4e46f3bd7505cac1e6029dff153
SHA14da9506b1e7724c865b90d109ecacc56595371b3
SHA2566a0d7018684de6e18fe5ee20801bf8f71133830f866d0ca3522a2417a2afabdb
SHA51232cb494a8d7732b409745371ff735bada1b5c039102bc8814e5e77a9c049789eca8ec1e3a8382cbda1489531801bce6f37d387ad9ebed41d3428ffa44cdce734