Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
48c9a66da61057450239ea47f9e8341b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48c9a66da61057450239ea47f9e8341b.exe
Resource
win10v2004-20231222-en
General
-
Target
48c9a66da61057450239ea47f9e8341b.exe
-
Size
771KB
-
MD5
48c9a66da61057450239ea47f9e8341b
-
SHA1
2540b8e02610d01f9bb00dc67dff2c8e0c4fe43e
-
SHA256
35b1108749bee00cf4bc02d85c89639d19227389182edcff7d9dc4bf7e4f1c34
-
SHA512
235217b1cf1d49091cb5e2cd1776eefabc8945c4700dc92941bcdcac47dd3d4441bc4af8f3acb40db2c7ff7e82179beb60e934c4be083b1cff291d36f8ec057a
-
SSDEEP
24576:vAguFEGKIVzpkWw0MHAMDf8b10hJaothZ2/T6FBBB:YgtGBVzpkW76u/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4856 48c9a66da61057450239ea47f9e8341b.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 48c9a66da61057450239ea47f9e8341b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3952 48c9a66da61057450239ea47f9e8341b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3952 48c9a66da61057450239ea47f9e8341b.exe 4856 48c9a66da61057450239ea47f9e8341b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 4856 3952 48c9a66da61057450239ea47f9e8341b.exe 91 PID 3952 wrote to memory of 4856 3952 48c9a66da61057450239ea47f9e8341b.exe 91 PID 3952 wrote to memory of 4856 3952 48c9a66da61057450239ea47f9e8341b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c9a66da61057450239ea47f9e8341b.exe"C:\Users\Admin\AppData\Local\Temp\48c9a66da61057450239ea47f9e8341b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\48c9a66da61057450239ea47f9e8341b.exeC:\Users\Admin\AppData\Local\Temp\48c9a66da61057450239ea47f9e8341b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD599647f8243eb4da228aaefa3db16e5d5
SHA15faf38b373d06351ae874d4caff582aa02f8d615
SHA2565321b71075076f106388563245ab5899fdf9a4ce698b30fb5ab77649ab5354fd
SHA5123cf41f1e7b888d42d3f92ff49300e58a2f458716d80566ab57b2ca90de606d1ed7dc2f22e42d1a7108182d52f7d1078ad6830b3444808866409edeba71df11ee