Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
46e7ac59671ee7c8862ac16bbec32733.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46e7ac59671ee7c8862ac16bbec32733.exe
Resource
win10v2004-20231222-en
General
-
Target
46e7ac59671ee7c8862ac16bbec32733.exe
-
Size
385KB
-
MD5
46e7ac59671ee7c8862ac16bbec32733
-
SHA1
b628413f1f3c1393669347f3c5201707a7e2ec5a
-
SHA256
665d8dff5f0229071787c75d3d1ac5a2d181405ab3a01e14c700e0435c20ee3e
-
SHA512
4441605f6b875d0ddd0ffa1cf5a479cb01e5ea1df0b5bd09fdde042a0d1b205d2a6a1ea269c5fc1f0cedbaafffeec396544b7f837a19e9f0a8c2de12bb04c671
-
SSDEEP
6144:8AAQwHRWp5/r3jj74VzxYRpl/NlKjciGKIrQ75VWPQB355uaiEpR2YJhB:8A8HopFjP4VFYRLDLt0JB3zxpXhB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4456 46e7ac59671ee7c8862ac16bbec32733.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 46e7ac59671ee7c8862ac16bbec32733.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3052 46e7ac59671ee7c8862ac16bbec32733.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3052 46e7ac59671ee7c8862ac16bbec32733.exe 4456 46e7ac59671ee7c8862ac16bbec32733.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4456 3052 46e7ac59671ee7c8862ac16bbec32733.exe 89 PID 3052 wrote to memory of 4456 3052 46e7ac59671ee7c8862ac16bbec32733.exe 89 PID 3052 wrote to memory of 4456 3052 46e7ac59671ee7c8862ac16bbec32733.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e7ac59671ee7c8862ac16bbec32733.exe"C:\Users\Admin\AppData\Local\Temp\46e7ac59671ee7c8862ac16bbec32733.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\46e7ac59671ee7c8862ac16bbec32733.exeC:\Users\Admin\AppData\Local\Temp\46e7ac59671ee7c8862ac16bbec32733.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d207fdd5157e8f2d727b6da90e3f925a
SHA196282dfb327a0b6102087aa70d9ee30c488da75e
SHA2563866e29ef3609d08979d293815766ea3cc4dafc079e2fa82629afaa5dc54ad0f
SHA512cb932e155867829538e14be80e528dad7566806d62d45b5e98dfebcab4f25e3c240ab0d438736ec3cb7bfca507ea64a595d93d01b34efea170e570b17780b028