Analysis
-
max time kernel
181s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
48fb3d1982bef037cb2ffeb72df170f1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48fb3d1982bef037cb2ffeb72df170f1.exe
Resource
win10v2004-20231215-en
General
-
Target
48fb3d1982bef037cb2ffeb72df170f1.exe
-
Size
385KB
-
MD5
48fb3d1982bef037cb2ffeb72df170f1
-
SHA1
39c9ed5bee8f7a99e1ede5972e37a1a000e612f9
-
SHA256
1b8c20b0a5e69765e68c548d2e3ef8000ecf925eff12efa07a8514e40c7a12a5
-
SHA512
befe5377da25d9f600c77f43b9680bbd947fd5bfdd432cdc5c01da4d1924f91dd0a22a89f9584b6108a0cf81edcd89a5aca2f9029b21c5fada4cac5fcf6770eb
-
SSDEEP
6144:OIRljmsyiqEhzThWVe0ptWtzRKxDAc/aip+j11SzXkTjxK8JYSjFcqvB:OUlisMEhvwVqjKxDZ/atmYDAqvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1516 48fb3d1982bef037cb2ffeb72df170f1.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 48fb3d1982bef037cb2ffeb72df170f1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1816 48fb3d1982bef037cb2ffeb72df170f1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1816 48fb3d1982bef037cb2ffeb72df170f1.exe 1516 48fb3d1982bef037cb2ffeb72df170f1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1816 wrote to memory of 1516 1816 48fb3d1982bef037cb2ffeb72df170f1.exe 96 PID 1816 wrote to memory of 1516 1816 48fb3d1982bef037cb2ffeb72df170f1.exe 96 PID 1816 wrote to memory of 1516 1816 48fb3d1982bef037cb2ffeb72df170f1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\48fb3d1982bef037cb2ffeb72df170f1.exe"C:\Users\Admin\AppData\Local\Temp\48fb3d1982bef037cb2ffeb72df170f1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\48fb3d1982bef037cb2ffeb72df170f1.exeC:\Users\Admin\AppData\Local\Temp\48fb3d1982bef037cb2ffeb72df170f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5b9127c5e96a214b94e2f0eed418da16c
SHA13122473f47207d9efcc77c74ed6486bb50f365bc
SHA25663f46d308ab906b5ca2b8ccc02a2a904f18dd861eef16c2d6b1bb58543e1e078
SHA512031019e86e7c9ca6d1867df22a2bef7eb9ecab92aa76fdff3610b5edb030465ee5f9e2e22846e6297ce258e9908b10a1e3b93c7293074b9b3acde6a4a3f0098e