Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
4137da665242a5af2b3b5a5d2037b02a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4137da665242a5af2b3b5a5d2037b02a.exe
Resource
win10v2004-20231215-en
General
-
Target
4137da665242a5af2b3b5a5d2037b02a.exe
-
Size
907KB
-
MD5
4137da665242a5af2b3b5a5d2037b02a
-
SHA1
0266de35305809ec222cc4485dedba61f69e7670
-
SHA256
a8f6b825fe3c873918f569c47a4cc6734460f2a91a180f3f73961f4d902f1976
-
SHA512
82bf3f46c2cde568c3cf6d832d30c77ff26b8a4510336b3d6f853e551c338465d9a81f7afadf53cd5c8ea7d2d568788fa4fafa374cdf193ac58d68a3b9ed2842
-
SSDEEP
24576:1oTFNhyScBdADDJegOgTJHet3jvOavQa/ZS1:YhRE6Tk26QgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1396 4137da665242a5af2b3b5a5d2037b02a.exe -
Executes dropped EXE 1 IoCs
pid Process 1396 4137da665242a5af2b3b5a5d2037b02a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3656 4137da665242a5af2b3b5a5d2037b02a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3656 4137da665242a5af2b3b5a5d2037b02a.exe 1396 4137da665242a5af2b3b5a5d2037b02a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1396 3656 4137da665242a5af2b3b5a5d2037b02a.exe 66 PID 3656 wrote to memory of 1396 3656 4137da665242a5af2b3b5a5d2037b02a.exe 66 PID 3656 wrote to memory of 1396 3656 4137da665242a5af2b3b5a5d2037b02a.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\4137da665242a5af2b3b5a5d2037b02a.exe"C:\Users\Admin\AppData\Local\Temp\4137da665242a5af2b3b5a5d2037b02a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\4137da665242a5af2b3b5a5d2037b02a.exeC:\Users\Admin\AppData\Local\Temp\4137da665242a5af2b3b5a5d2037b02a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5c4f070c08c24ac51f0ba63cefd759355
SHA17cb9f3495ed232f98084201d39fec25a251c7cf1
SHA256484513bbf98768ebffea9491560f7ce1bacf019ab98582c22fdddab29da6613b
SHA51237b6b99ea514b5ccf3d3a88af0ad607519a677aa930e69da4a06dc72f45058753e43c26bfbbc2eb232c382bebeb09a6ada41ea8a99e6f64e8542861ae80d6bc3