Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 14:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
43edc8b13f5dfd48fa0026f7d3dee56a.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
43edc8b13f5dfd48fa0026f7d3dee56a.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
43edc8b13f5dfd48fa0026f7d3dee56a.exe
-
Size
385KB
-
MD5
43edc8b13f5dfd48fa0026f7d3dee56a
-
SHA1
6565e1700a287e9542cd573103bdb52cd0d1ccd9
-
SHA256
05f61b41bc86a62a061b181c8d0c94268fa74ff7062f57d17b1ff68c4cf878f9
-
SHA512
a057a577a906df66c7d0e823f28d9a623498725fb01fd248cb3b9fdce5991bfd0dc8bfaa4df3ef08bc16ae8d57f99e835f68eee792f94104b38ac02835d24238
-
SSDEEP
12288:tiD9q/CZegntHG+2ck4iL+1RWHaY3GT7bFjiB:tDAeytmsk4a+mHaY3GPbFjiB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3964 43edc8b13f5dfd48fa0026f7d3dee56a.exe -
Executes dropped EXE 1 IoCs
pid Process 3964 43edc8b13f5dfd48fa0026f7d3dee56a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4896 43edc8b13f5dfd48fa0026f7d3dee56a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4896 43edc8b13f5dfd48fa0026f7d3dee56a.exe 3964 43edc8b13f5dfd48fa0026f7d3dee56a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 3964 4896 43edc8b13f5dfd48fa0026f7d3dee56a.exe 20 PID 4896 wrote to memory of 3964 4896 43edc8b13f5dfd48fa0026f7d3dee56a.exe 20 PID 4896 wrote to memory of 3964 4896 43edc8b13f5dfd48fa0026f7d3dee56a.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\43edc8b13f5dfd48fa0026f7d3dee56a.exe"C:\Users\Admin\AppData\Local\Temp\43edc8b13f5dfd48fa0026f7d3dee56a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\43edc8b13f5dfd48fa0026f7d3dee56a.exeC:\Users\Admin\AppData\Local\Temp\43edc8b13f5dfd48fa0026f7d3dee56a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3964
-