Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
46c05b299606bc97d70b5e106ed407ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46c05b299606bc97d70b5e106ed407ab.exe
Resource
win10v2004-20231215-en
General
-
Target
46c05b299606bc97d70b5e106ed407ab.exe
-
Size
385KB
-
MD5
46c05b299606bc97d70b5e106ed407ab
-
SHA1
cd48f6dd9c88f130ca5b441aa15bae438fd1d786
-
SHA256
44a553ccdbc7b41833e9c81e6e83f60b63b652d24798ff70915caf933fd48e74
-
SHA512
9974f0623f1dadb98b3a208d00d2d3ef01c5ababf35581a1a2927d8dc38d6e2cbec9940391e889dc62c724ff6fd4ed7ebf7e4a19538b3420778b1b961ab7ac05
-
SSDEEP
6144:iixZ46w16G72Iy2F8jpv5Cnt409sjteUa6KieoJv5RdOAV2aOPfA1AB:izZ6KDRQFOt409sbiqvhOAV2aOweB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 46c05b299606bc97d70b5e106ed407ab.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 46c05b299606bc97d70b5e106ed407ab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3700 46c05b299606bc97d70b5e106ed407ab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3700 46c05b299606bc97d70b5e106ed407ab.exe 2016 46c05b299606bc97d70b5e106ed407ab.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3700 wrote to memory of 2016 3700 46c05b299606bc97d70b5e106ed407ab.exe 91 PID 3700 wrote to memory of 2016 3700 46c05b299606bc97d70b5e106ed407ab.exe 91 PID 3700 wrote to memory of 2016 3700 46c05b299606bc97d70b5e106ed407ab.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c05b299606bc97d70b5e106ed407ab.exe"C:\Users\Admin\AppData\Local\Temp\46c05b299606bc97d70b5e106ed407ab.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\46c05b299606bc97d70b5e106ed407ab.exeC:\Users\Admin\AppData\Local\Temp\46c05b299606bc97d70b5e106ed407ab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD580eb0c482d2c2105193a6f16aa0d4973
SHA1d152e16dcfb498de652fb0a0c23943d93f5e3f17
SHA25649e5848c70daede4f860c3cc2f556ac9af94bb7cd3677d86b11152794fae8eb4
SHA5126eeef01678cfc788522ed73689070b1ed6694addff32ab87f82e45e0072b537da671b8887e9b84d428943ac09cd2da1cc2cc505a4f71e671c439e65abbb845dc