Analysis
-
max time kernel
144s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
4b2e08c36c92b2447f5d655c2872322a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b2e08c36c92b2447f5d655c2872322a.exe
Resource
win10v2004-20231215-en
General
-
Target
4b2e08c36c92b2447f5d655c2872322a.exe
-
Size
771KB
-
MD5
4b2e08c36c92b2447f5d655c2872322a
-
SHA1
41f0ce222f20a747ca4220c28eae9ff67d1fb383
-
SHA256
381ed44b89a16e5af77c4b8fe1f5795f3ed154d3b0e708ef56a4a8b077734e06
-
SHA512
b3343ddfcaf74d7533a9d04de684f1771c9007674d5cc55e32354c084867e2e97db95e60cb03ab2b92580629a60cf7ed1350a58dded0125113af813bce6da5ff
-
SSDEEP
12288:Mi7wlcJSfXUpzInSV90cODLJY/x4ajPCmQlb10VHmDXTuFaa2AtyGTKOF25ZoJJf:58XcMyGPg4ajq5b10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 4b2e08c36c92b2447f5d655c2872322a.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 4b2e08c36c92b2447f5d655c2872322a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3240 4b2e08c36c92b2447f5d655c2872322a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3240 4b2e08c36c92b2447f5d655c2872322a.exe 2732 4b2e08c36c92b2447f5d655c2872322a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2732 3240 4b2e08c36c92b2447f5d655c2872322a.exe 93 PID 3240 wrote to memory of 2732 3240 4b2e08c36c92b2447f5d655c2872322a.exe 93 PID 3240 wrote to memory of 2732 3240 4b2e08c36c92b2447f5d655c2872322a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2e08c36c92b2447f5d655c2872322a.exe"C:\Users\Admin\AppData\Local\Temp\4b2e08c36c92b2447f5d655c2872322a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\4b2e08c36c92b2447f5d655c2872322a.exeC:\Users\Admin\AppData\Local\Temp\4b2e08c36c92b2447f5d655c2872322a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD54408922b2e8a5a7700b5b167cbe68afb
SHA1b268e65d8500953cc1de6bcc1076df04502dfff5
SHA2566187dea952f1c0f1d96938681656e41303e6ee31379aca254d42ca59bdfba538
SHA512792e54a8ce92ebcd0cc4ca8bd39001e7631d8c35d8982ad926d988ba4e691020e4b9d520d7c5735b35915e0908d6427089dfdc682dedd91d99821bcf826b8b98