Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
4a1d4dc4a2758ac16903d16c8bafa39d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a1d4dc4a2758ac16903d16c8bafa39d.exe
Resource
win10v2004-20231215-en
General
-
Target
4a1d4dc4a2758ac16903d16c8bafa39d.exe
-
Size
771KB
-
MD5
4a1d4dc4a2758ac16903d16c8bafa39d
-
SHA1
a1649e133246ae793c252f89d378ca86014f918e
-
SHA256
39c6cefffa65c0aa908a00d91790e20cfaf3ca6a12ca603cc343db98d4c4a723
-
SHA512
5ed3676a574aabc55f71f8dbe0eb7601ce85cca1a5b9e9b1039d9b63f40d58838f22b99801899dd38c8783ac7aaa6472403d88fe6b4b8d6969d655583db40762
-
SSDEEP
24576:bJddESnfcz8v5dXzxCLrAIWe2xDigUIHQoiy9TGiEdDdbfFuJ36NoO3bM2d5CeI+:bJddESnfcz8v5dXzxCLrAIWe2xNUIHQ5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3520 4a1d4dc4a2758ac16903d16c8bafa39d.exe -
Executes dropped EXE 1 IoCs
pid Process 3520 4a1d4dc4a2758ac16903d16c8bafa39d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2116 4a1d4dc4a2758ac16903d16c8bafa39d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2116 4a1d4dc4a2758ac16903d16c8bafa39d.exe 3520 4a1d4dc4a2758ac16903d16c8bafa39d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3520 2116 4a1d4dc4a2758ac16903d16c8bafa39d.exe 89 PID 2116 wrote to memory of 3520 2116 4a1d4dc4a2758ac16903d16c8bafa39d.exe 89 PID 2116 wrote to memory of 3520 2116 4a1d4dc4a2758ac16903d16c8bafa39d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a1d4dc4a2758ac16903d16c8bafa39d.exe"C:\Users\Admin\AppData\Local\Temp\4a1d4dc4a2758ac16903d16c8bafa39d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\4a1d4dc4a2758ac16903d16c8bafa39d.exeC:\Users\Admin\AppData\Local\Temp\4a1d4dc4a2758ac16903d16c8bafa39d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD503520d1fa27216ffe161b2d62e102120
SHA1e0559150b44333b779b3e731d0820e28a10be0ff
SHA2565f020217e5fb37a0c572fc9389b7b7a78e126c3df091b6def76b7de2277e9ba2
SHA512c09953d591a00f7e787ecad7bff465b34f3d033a3428eb163e030014ece60a86a10ea67c465b43d16721aa9a24f3d2d7bc4b6a786028347248e65fb08f1a228c