Analysis

  • max time kernel
    149s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 00:45

General

  • Target

    4a370f68c2fd5998b892e5d3ce0b8567.exe

  • Size

    385KB

  • MD5

    4a370f68c2fd5998b892e5d3ce0b8567

  • SHA1

    bb6a60bcd0c0de6a0b783638566180922b39986a

  • SHA256

    a60b9d9a58719b63326a08cf636c949429befc2cb6883c0f2a95e20409dd4dd3

  • SHA512

    994b2eec6d5c978dddbccce8bf641a9ca390e89437a52358be04c3e355bced13986526f3d7d525ebdac676a9097e0573d1bde290b7e0023ad387ef72b7806936

  • SSDEEP

    6144:Cnn7ydncs4pmh7gRzc+hWM+VtO1Cxlwl2lK7ReEiInI5bZjXjenu8bAdKEqMPQIv:Eocs4pbOHVlcjtnvqggBfbB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe
    "C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe
      C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe

    Filesize

    385KB

    MD5

    0da6feca7ce0c7195cea0210834e829b

    SHA1

    e24899cbfaccb9fcb1b5902815f73d09af8aabc5

    SHA256

    0146529110d8c739e873d3e162ff09a55adb460e0146c0e9187c0843c5da2849

    SHA512

    1fab7e12d283fd68497f41f85c73843f74cb1f02a4489e9958c4301eda49e6acfb288416c53781bdd6a9133752fcd6bc851ccd6e474988686b6977e887685f58

  • memory/3428-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3428-1-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/3428-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3428-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4024-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4024-16-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/4024-20-0x0000000004F30000-0x0000000004F8F000-memory.dmp

    Filesize

    380KB

  • memory/4024-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4024-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4024-35-0x000000000C640000-0x000000000C67C000-memory.dmp

    Filesize

    240KB

  • memory/4024-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB