Analysis
-
max time kernel
6s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 14:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4683a41ffc09578d18050cfbb254a28c.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4683a41ffc09578d18050cfbb254a28c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4683a41ffc09578d18050cfbb254a28c.exe
-
Size
385KB
-
MD5
4683a41ffc09578d18050cfbb254a28c
-
SHA1
b8c168fd7b141def7387b72376b81f834767bf08
-
SHA256
93b81a33de69eec71b1d266d8314fad471064343d6cd173caf58128ce2bf9173
-
SHA512
bc2c9d2a9f5c27d31d84803998758696114a8499410ea638bc5a846fe7dca8be683911f7cbbe9207e49501db40bb9cfa0d47020b4d085c4ac47f836bbf1ab29a
-
SSDEEP
6144:vLYCna6Bcc2EYyH2gP84Qkdw8i05nmzwp1leyLbrHg/uS1lknjhB:DYuuA2VxkU05mmHH8u8IlB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 4683a41ffc09578d18050cfbb254a28c.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 4683a41ffc09578d18050cfbb254a28c.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 4683a41ffc09578d18050cfbb254a28c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1872 4683a41ffc09578d18050cfbb254a28c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1872 4683a41ffc09578d18050cfbb254a28c.exe 2420 4683a41ffc09578d18050cfbb254a28c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2420 1872 4683a41ffc09578d18050cfbb254a28c.exe 14 PID 1872 wrote to memory of 2420 1872 4683a41ffc09578d18050cfbb254a28c.exe 14 PID 1872 wrote to memory of 2420 1872 4683a41ffc09578d18050cfbb254a28c.exe 14 PID 1872 wrote to memory of 2420 1872 4683a41ffc09578d18050cfbb254a28c.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exeC:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2420
-
C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe"C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1872