Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 13:03

General

  • Target

    372588444c123f78a8d3c4431ede32b0.exe

  • Size

    385KB

  • MD5

    372588444c123f78a8d3c4431ede32b0

  • SHA1

    1001fdd5510bd3fa08b7724213030c1e935205c9

  • SHA256

    9d7d7241ce4427e182781bc155e75eb4a1eaa0e4a3be49a4d81f57584e51163f

  • SHA512

    34b4b4f64e4bf701c05f350015e96fa3bb0a40f939fca58a0814fdaf9ab5ef5f484e39447f8446e5ba435f34e61f13b3b0234bc5ab0b7fed5cd91119b8698d98

  • SSDEEP

    6144:0YluaAN7JciuNqZXj+0akf6ltUhRQxqqlXjRQIO0y9MM9TY3s9irV9p8HB:FI1JciuNqF+BystUh4zRQIRrMN9wV2B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe
    "C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe
      C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\372588444c123f78a8d3c4431ede32b0.exe

    Filesize

    385KB

    MD5

    81efa00f1ad8745b8f824dae9aab0dc5

    SHA1

    b1ebc961bea3ae44b447c8218c6db85fbb9bf323

    SHA256

    b4d3e6ca866761d467fa8806d0e29e1b1f2fd94b02530d5eb614791fafb84c3d

    SHA512

    e2ac34b00f2c419554f626f59785be9c5d4552a955a4386c3d45f8da5708ce90775a896b36eb113904bc8b775ec61ce8205d220444903e33daa44c60d80f15e4

  • memory/2088-16-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/2088-14-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2088-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2088-20-0x0000000004EA0000-0x0000000004EFF000-memory.dmp

    Filesize

    380KB

  • memory/2088-34-0x000000000C620000-0x000000000C65C000-memory.dmp

    Filesize

    240KB

  • memory/2088-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2088-38-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2420-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2420-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/2420-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2420-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB