Analysis
-
max time kernel
147s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
4683a41ffc09578d18050cfbb254a28c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4683a41ffc09578d18050cfbb254a28c.exe
Resource
win10v2004-20231215-en
General
-
Target
4683a41ffc09578d18050cfbb254a28c.exe
-
Size
385KB
-
MD5
4683a41ffc09578d18050cfbb254a28c
-
SHA1
b8c168fd7b141def7387b72376b81f834767bf08
-
SHA256
93b81a33de69eec71b1d266d8314fad471064343d6cd173caf58128ce2bf9173
-
SHA512
bc2c9d2a9f5c27d31d84803998758696114a8499410ea638bc5a846fe7dca8be683911f7cbbe9207e49501db40bb9cfa0d47020b4d085c4ac47f836bbf1ab29a
-
SSDEEP
6144:vLYCna6Bcc2EYyH2gP84Qkdw8i05nmzwp1leyLbrHg/uS1lknjhB:DYuuA2VxkU05mmHH8u8IlB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 4683a41ffc09578d18050cfbb254a28c.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 4683a41ffc09578d18050cfbb254a28c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 4683a41ffc09578d18050cfbb254a28c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 4683a41ffc09578d18050cfbb254a28c.exe 1956 4683a41ffc09578d18050cfbb254a28c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1956 1696 4683a41ffc09578d18050cfbb254a28c.exe 90 PID 1696 wrote to memory of 1956 1696 4683a41ffc09578d18050cfbb254a28c.exe 90 PID 1696 wrote to memory of 1956 1696 4683a41ffc09578d18050cfbb254a28c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe"C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exeC:\Users\Admin\AppData\Local\Temp\4683a41ffc09578d18050cfbb254a28c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD57ff5e42ad769efd7e225fd4f9333592a
SHA1f9c4a16167c12fbff01e2abb8e56a85362b5178a
SHA2566a35e51ac0226c232b7831b7e0cb7c2a1cddbecc3fa6edafd0fd273e8f7b74ea
SHA5120b5a05fcd08d693bfa205e02c1a2b215a753393fcdc1890a7eac92a650a379f11e4a841470c0af57db0a33517bedb3d2740d182bc8d8f2af3fff221616c99327