Analysis
-
max time kernel
9s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
417d8f50a774226b55b9fa64ff9be4d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
417d8f50a774226b55b9fa64ff9be4d9.exe
Resource
win10v2004-20231215-en
General
-
Target
417d8f50a774226b55b9fa64ff9be4d9.exe
-
Size
385KB
-
MD5
417d8f50a774226b55b9fa64ff9be4d9
-
SHA1
4dd19f5bbbb4418a7c4b68f301941924ab317a4c
-
SHA256
7c57c242d8fb1376bcc97b83493965c2677664e0b0eaee5d048acbf329d84d3e
-
SHA512
60aa4fef9de75e66e14bf03cc3a165fd36e8088c519aa63ebf07b99f373ae76dd0e74b83b97249e43bc951aa0d00653836bec84632e69c5b272e5245ab12687b
-
SSDEEP
6144:r5ceGlFl6P3HUqLVwna+d+L0TUq6rY0H9iy/2Q8ejB:r6eGl6P30E8a+00TR6rYa9iyh8ejB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 417d8f50a774226b55b9fa64ff9be4d9.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 417d8f50a774226b55b9fa64ff9be4d9.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 417d8f50a774226b55b9fa64ff9be4d9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 417d8f50a774226b55b9fa64ff9be4d9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 417d8f50a774226b55b9fa64ff9be4d9.exe 2924 417d8f50a774226b55b9fa64ff9be4d9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2924 2976 417d8f50a774226b55b9fa64ff9be4d9.exe 14 PID 2976 wrote to memory of 2924 2976 417d8f50a774226b55b9fa64ff9be4d9.exe 14 PID 2976 wrote to memory of 2924 2976 417d8f50a774226b55b9fa64ff9be4d9.exe 14 PID 2976 wrote to memory of 2924 2976 417d8f50a774226b55b9fa64ff9be4d9.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\417d8f50a774226b55b9fa64ff9be4d9.exeC:\Users\Admin\AppData\Local\Temp\417d8f50a774226b55b9fa64ff9be4d9.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2924
-
C:\Users\Admin\AppData\Local\Temp\417d8f50a774226b55b9fa64ff9be4d9.exe"C:\Users\Admin\AppData\Local\Temp\417d8f50a774226b55b9fa64ff9be4d9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b03493ba47943e61afc3ea4dc2f26afc
SHA194d8600509a8166e2754176266cbd1a0c441cdc4
SHA2565bc05a1f24fbb7e26a79f49edd6053277f3725c9e7ffcc7d9f9974626cdbdfa9
SHA51214174a49914ae55366f93796b4f95bd90615f39b225676c44758d163293ed649a3422559b9209a76edb27d3f6723c5b8b227a915273bc86e928b100bac34497a
-
Filesize
1KB
MD51f1a3b101012e27df35286ed1cf74aa6
SHA146f36d1c9715589e45558bd53b721e8f7f52a888
SHA2567f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c
SHA512d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3
-
Filesize
12KB
MD5248e2477cef276d9cec1abb3a3076ca6
SHA1b84f4d944ecafe0e0221220b7d776ded25375cea
SHA25691419c5e5ed5b16ecd17ca859245797962764095ef232b0943c0cf2dc2f16b89
SHA512efbcd48034c4ecdcae393d4360ffb60d9d04c1d3aad7e287b5d422fd200277eea0bc94eabf108bd6ae1240264f94d81a406f660c477249d512aa7af5ed9e6c0b
-
Filesize
52KB
MD50a720ab91caee4132ae51b2d4368f0dd
SHA149f36e4399f6eb6e55c871ba6f7fd10bddbef09c
SHA256800cf49a8ba87c6331813b3f8e723150a9a8e37348e85b27f95ceb7a58b48f25
SHA5120e67019dfe5ccc9aba33a5a561c1636c8172ada49261aa67e52e3bd25d68c90de358e28684d892e6b222b2b50656d98e4863c32ec8191641f0a0be9a82974289