Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe
Resource
win10v2004-20231215-en
General
-
Target
41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe
-
Size
907KB
-
MD5
41c5cb8bbd88ca8be1d6fd075c8ef8ad
-
SHA1
483bbfda7bb85b58d94c431d394b76a9d079d868
-
SHA256
5ff4a015ea24be3ac86c570eda65e512f6265503926cabe788d9adf245513ad9
-
SHA512
f186e73abfdeb20e94deaa2daeab56da09699e0ac99cdb52b8be5f4cdcff18359d73d76a01b76e5100431537034ee188cd65048710e11c060dd11a1697fc245d
-
SSDEEP
24576:Am7+LmlAoMUrEOZjbfsbLHbzxC+ws5a/ZS1:dymjMUrEO9fsh8s5gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5004 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5004 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe 2156 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2156 5004 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe 91 PID 5004 wrote to memory of 2156 5004 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe 91 PID 5004 wrote to memory of 2156 5004 41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe"C:\Users\Admin\AppData\Local\Temp\41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\41c5cb8bbd88ca8be1d6fd075c8ef8ad.exeC:\Users\Admin\AppData\Local\Temp\41c5cb8bbd88ca8be1d6fd075c8ef8ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD50911102bd31b9b6d904c10759c5d6df3
SHA1d5750994669a65042f7e4a7c552cac1d82f3faeb
SHA2567e335394c5e894f536567ef765444b081d7d898240b2ecf96f85c8c8e03dfb95
SHA512bedd3fe0966642b6cdcac12452fbcd0a79fa74f139c17dfcc27435c049d6d6709bd1754c18c96274fdf2d651a3b744cfbba45bc0ae6b50c123f01c0fd6dabc06