Analysis
-
max time kernel
2s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
45b33b0740788dc3c218c1127b97b77f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
45b33b0740788dc3c218c1127b97b77f.exe
Resource
win10v2004-20231215-en
General
-
Target
45b33b0740788dc3c218c1127b97b77f.exe
-
Size
385KB
-
MD5
45b33b0740788dc3c218c1127b97b77f
-
SHA1
fcd05797328b09a4a0687231360db787c87e492b
-
SHA256
da0a359988e5968fb5026e4f8c8bd07072a161dafe21bc650a07604bf5b5f1f2
-
SHA512
d3df91a18c0c5a5c9424f068fe8c30be6ef94ae76ff42800936bb088ed7fe2cbdb315f7b1a2ebd8b151851249aefcf8ea6bca577a667aebea4d97f8ad71fbe0a
-
SSDEEP
6144:P1sc9BSQS5ObA+cPFC2uBnpxWtCvX6r1T7wwAB+hLzqNPDw/VoiiHRoUx7vutB:P1sc9IjPPF5Iua6rRFPhADZlx7v8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 45b33b0740788dc3c218c1127b97b77f.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 45b33b0740788dc3c218c1127b97b77f.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 45b33b0740788dc3c218c1127b97b77f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2092 45b33b0740788dc3c218c1127b97b77f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2092 45b33b0740788dc3c218c1127b97b77f.exe 3052 45b33b0740788dc3c218c1127b97b77f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3052 2092 45b33b0740788dc3c218c1127b97b77f.exe 14 PID 2092 wrote to memory of 3052 2092 45b33b0740788dc3c218c1127b97b77f.exe 14 PID 2092 wrote to memory of 3052 2092 45b33b0740788dc3c218c1127b97b77f.exe 14 PID 2092 wrote to memory of 3052 2092 45b33b0740788dc3c218c1127b97b77f.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b33b0740788dc3c218c1127b97b77f.exeC:\Users\Admin\AppData\Local\Temp\45b33b0740788dc3c218c1127b97b77f.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
C:\Users\Admin\AppData\Local\Temp\45b33b0740788dc3c218c1127b97b77f.exe"C:\Users\Admin\AppData\Local\Temp\45b33b0740788dc3c218c1127b97b77f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e3635ab4fb118adf242c8c2ae3e62da3
SHA16a5cbe6d58ecdf29cb0ce9720e3651047d5041b1
SHA25685abb6f4b0b142170cc2d26e18506b7f8e6afe43fdf4fc4b7b9aa38db56a1b19
SHA512e9a657cfae922e33d0a67a7c04c82938e38bd015b2aed7985f7922fa19fdb5cc1a1e3b30f07acb154fdc01667fa973e89492c4167eef0c1114ab410caf252dd2