Analysis
-
max time kernel
16s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 20:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c5b899b1846ce714b77fc6de2d64cdb.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c5b899b1846ce714b77fc6de2d64cdb.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4c5b899b1846ce714b77fc6de2d64cdb.exe
-
Size
385KB
-
MD5
4c5b899b1846ce714b77fc6de2d64cdb
-
SHA1
09728d0a4a8ff77af0334668a111f8107174d0c3
-
SHA256
bf2926ade8f6f6ff6f0cbce945c251cf6644732f49b00b07a37576158d236b60
-
SHA512
1c8f7f7cdfb30951fa642a8a01c407599095f53536c66f572e0c78a3bb72d47029db44cc86e3fc5dcae0722b478748196e5de5cf0fb8257a7c7b59b2e0d73eba
-
SSDEEP
6144:+2sPVQyr/+QNNPzciFKfuCB2qDk7gCbp9EFsJqT4js1iI9uslgU1EvTsLdeKqiB:+dr/+UNP9pr7gmp9VYMjs1iIQA+CB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 4c5b899b1846ce714b77fc6de2d64cdb.exe -
Executes dropped EXE 1 IoCs
pid Process 1048 4c5b899b1846ce714b77fc6de2d64cdb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 4c5b899b1846ce714b77fc6de2d64cdb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2368 4c5b899b1846ce714b77fc6de2d64cdb.exe 1048 4c5b899b1846ce714b77fc6de2d64cdb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1048 2368 4c5b899b1846ce714b77fc6de2d64cdb.exe 57 PID 2368 wrote to memory of 1048 2368 4c5b899b1846ce714b77fc6de2d64cdb.exe 57 PID 2368 wrote to memory of 1048 2368 4c5b899b1846ce714b77fc6de2d64cdb.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c5b899b1846ce714b77fc6de2d64cdb.exe"C:\Users\Admin\AppData\Local\Temp\4c5b899b1846ce714b77fc6de2d64cdb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\4c5b899b1846ce714b77fc6de2d64cdb.exeC:\Users\Admin\AppData\Local\Temp\4c5b899b1846ce714b77fc6de2d64cdb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1048
-