Analysis
-
max time kernel
149s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
4a370f68c2fd5998b892e5d3ce0b8567.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a370f68c2fd5998b892e5d3ce0b8567.exe
Resource
win10v2004-20231215-en
General
-
Target
4a370f68c2fd5998b892e5d3ce0b8567.exe
-
Size
385KB
-
MD5
4a370f68c2fd5998b892e5d3ce0b8567
-
SHA1
bb6a60bcd0c0de6a0b783638566180922b39986a
-
SHA256
a60b9d9a58719b63326a08cf636c949429befc2cb6883c0f2a95e20409dd4dd3
-
SHA512
994b2eec6d5c978dddbccce8bf641a9ca390e89437a52358be04c3e355bced13986526f3d7d525ebdac676a9097e0573d1bde290b7e0023ad387ef72b7806936
-
SSDEEP
6144:Cnn7ydncs4pmh7gRzc+hWM+VtO1Cxlwl2lK7ReEiInI5bZjXjenu8bAdKEqMPQIv:Eocs4pbOHVlcjtnvqggBfbB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4024 4a370f68c2fd5998b892e5d3ce0b8567.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 4a370f68c2fd5998b892e5d3ce0b8567.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3428 4a370f68c2fd5998b892e5d3ce0b8567.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3428 4a370f68c2fd5998b892e5d3ce0b8567.exe 4024 4a370f68c2fd5998b892e5d3ce0b8567.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4024 3428 4a370f68c2fd5998b892e5d3ce0b8567.exe 92 PID 3428 wrote to memory of 4024 3428 4a370f68c2fd5998b892e5d3ce0b8567.exe 92 PID 3428 wrote to memory of 4024 3428 4a370f68c2fd5998b892e5d3ce0b8567.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe"C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exeC:\Users\Admin\AppData\Local\Temp\4a370f68c2fd5998b892e5d3ce0b8567.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD50da6feca7ce0c7195cea0210834e829b
SHA1e24899cbfaccb9fcb1b5902815f73d09af8aabc5
SHA2560146529110d8c739e873d3e162ff09a55adb460e0146c0e9187c0843c5da2849
SHA5121fab7e12d283fd68497f41f85c73843f74cb1f02a4489e9958c4301eda49e6acfb288416c53781bdd6a9133752fcd6bc851ccd6e474988686b6977e887685f58