Analysis
-
max time kernel
145s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 05:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
456cb72b97bffcbb308d95382bc5f7ab.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
456cb72b97bffcbb308d95382bc5f7ab.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
456cb72b97bffcbb308d95382bc5f7ab.exe
-
Size
385KB
-
MD5
456cb72b97bffcbb308d95382bc5f7ab
-
SHA1
1663a70901350b66c23a1aa1cb6921c2626f1dd9
-
SHA256
d8afe2235b27994d29a40060f82abbfddc0bc5d24efec6a53d7e1540e4455ce8
-
SHA512
83761382baacb6bab8bc0d0dd5476558fda723d9ac6b275be3f15f4e425f189dec9c91fc4c2a1d47344d388ed907a19028509e7fe4ceaea606fc9355f6b0e92c
-
SSDEEP
6144:1UeSzrb8GTBeI3XDc+7NnKSMZQaoa57Z2+H3o2f2EeobDtLhYQe32B:1UBbzBeQXDc+9KSZa5h42f7bD4QemB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2088 456cb72b97bffcbb308d95382bc5f7ab.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 456cb72b97bffcbb308d95382bc5f7ab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3948 456cb72b97bffcbb308d95382bc5f7ab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3948 456cb72b97bffcbb308d95382bc5f7ab.exe 2088 456cb72b97bffcbb308d95382bc5f7ab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2088 3948 456cb72b97bffcbb308d95382bc5f7ab.exe 15 PID 3948 wrote to memory of 2088 3948 456cb72b97bffcbb308d95382bc5f7ab.exe 15 PID 3948 wrote to memory of 2088 3948 456cb72b97bffcbb308d95382bc5f7ab.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\456cb72b97bffcbb308d95382bc5f7ab.exe"C:\Users\Admin\AppData\Local\Temp\456cb72b97bffcbb308d95382bc5f7ab.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\456cb72b97bffcbb308d95382bc5f7ab.exeC:\Users\Admin\AppData\Local\Temp\456cb72b97bffcbb308d95382bc5f7ab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2088
-