Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
425ccf28e1a0ab917123195ea5c3c0ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
425ccf28e1a0ab917123195ea5c3c0ca.exe
Resource
win10v2004-20231222-en
General
-
Target
425ccf28e1a0ab917123195ea5c3c0ca.exe
-
Size
907KB
-
MD5
425ccf28e1a0ab917123195ea5c3c0ca
-
SHA1
926f9e4af3b167c82c26bc597eee5419b13787cd
-
SHA256
2d20acc6011d118c14bac2dd51370d4be1579d0eb0c2bd3c3ad7f595a3b71272
-
SHA512
0b8ce143b0e5109ffbbef8e63866e3b5833f07355bfe9fc339ed5bc4f734f5f6ffd3b5ed55310a3967fab62e4f2b2351dc342b236cbd6c53b50239dcdfc71ada
-
SSDEEP
24576:IiTD46ZUwDFwiFrLokRoJ/4TKaoiP7na/ZS1:IiTFUKrVRrTKKP7gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 425ccf28e1a0ab917123195ea5c3c0ca.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 425ccf28e1a0ab917123195ea5c3c0ca.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5068 425ccf28e1a0ab917123195ea5c3c0ca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5068 425ccf28e1a0ab917123195ea5c3c0ca.exe 2948 425ccf28e1a0ab917123195ea5c3c0ca.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2948 5068 425ccf28e1a0ab917123195ea5c3c0ca.exe 17 PID 5068 wrote to memory of 2948 5068 425ccf28e1a0ab917123195ea5c3c0ca.exe 17 PID 5068 wrote to memory of 2948 5068 425ccf28e1a0ab917123195ea5c3c0ca.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\425ccf28e1a0ab917123195ea5c3c0ca.exe"C:\Users\Admin\AppData\Local\Temp\425ccf28e1a0ab917123195ea5c3c0ca.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\425ccf28e1a0ab917123195ea5c3c0ca.exeC:\Users\Admin\AppData\Local\Temp\425ccf28e1a0ab917123195ea5c3c0ca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5a7ec51e80cfcb5b090703a85301f333c
SHA1d72af31372e6cbedc2bb652cfa8db97954728d50
SHA2563b136ab9e13a935553eb258a5003abbfcc8bc6c75bb65f7feafa969af866e1aa
SHA51241ad1990b570daf2c4cbaa958bdba928cf87b0cbdf5cd681266211668b1688eb9ea9fa9520873383480299cbc441ce98b9401d9b3930a519b026b56352e21c2e