Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:03
Static task
static1
Behavioral task
behavioral1
Sample
372588444c123f78a8d3c4431ede32b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
372588444c123f78a8d3c4431ede32b0.exe
Resource
win10v2004-20231215-en
General
-
Target
372588444c123f78a8d3c4431ede32b0.exe
-
Size
385KB
-
MD5
372588444c123f78a8d3c4431ede32b0
-
SHA1
1001fdd5510bd3fa08b7724213030c1e935205c9
-
SHA256
9d7d7241ce4427e182781bc155e75eb4a1eaa0e4a3be49a4d81f57584e51163f
-
SHA512
34b4b4f64e4bf701c05f350015e96fa3bb0a40f939fca58a0814fdaf9ab5ef5f484e39447f8446e5ba435f34e61f13b3b0234bc5ab0b7fed5cd91119b8698d98
-
SSDEEP
6144:0YluaAN7JciuNqZXj+0akf6ltUhRQxqqlXjRQIO0y9MM9TY3s9irV9p8HB:FI1JciuNqF+BystUh4zRQIRrMN9wV2B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 372588444c123f78a8d3c4431ede32b0.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 372588444c123f78a8d3c4431ede32b0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 372588444c123f78a8d3c4431ede32b0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2420 372588444c123f78a8d3c4431ede32b0.exe 2088 372588444c123f78a8d3c4431ede32b0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2088 2420 372588444c123f78a8d3c4431ede32b0.exe 89 PID 2420 wrote to memory of 2088 2420 372588444c123f78a8d3c4431ede32b0.exe 89 PID 2420 wrote to memory of 2088 2420 372588444c123f78a8d3c4431ede32b0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe"C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exeC:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD581efa00f1ad8745b8f824dae9aab0dc5
SHA1b1ebc961bea3ae44b447c8218c6db85fbb9bf323
SHA256b4d3e6ca866761d467fa8806d0e29e1b1f2fd94b02530d5eb614791fafb84c3d
SHA512e2ac34b00f2c419554f626f59785be9c5d4552a955a4386c3d45f8da5708ce90775a896b36eb113904bc8b775ec61ce8205d220444903e33daa44c60d80f15e4