Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
4d73339049bb1d49414ae4275b7f1694.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d73339049bb1d49414ae4275b7f1694.exe
Resource
win10v2004-20231215-en
General
-
Target
4d73339049bb1d49414ae4275b7f1694.exe
-
Size
771KB
-
MD5
4d73339049bb1d49414ae4275b7f1694
-
SHA1
2f85a4153232bb0005a6d112acc84fba8ff78556
-
SHA256
1480b1f0c6df4e5095d0d43017c898b9e406cd830b6dfe6c23ea97c78f600869
-
SHA512
1062371685e220e4645bb95cb7d6d47b22a5b28797091ca004576014eb0a275df139e9fcc65eae076303c8b8b62857e8fa166868bdeac04106b3877303e0d587
-
SSDEEP
24576:+YcOi6743ZBQQ8J59XNjtvZWqEIz6qrfiTMB:+YcP674JBQQ8ZXHZQe6q7iT2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4660 4d73339049bb1d49414ae4275b7f1694.exe -
Executes dropped EXE 1 IoCs
pid Process 4660 4d73339049bb1d49414ae4275b7f1694.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4728 4d73339049bb1d49414ae4275b7f1694.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4728 4d73339049bb1d49414ae4275b7f1694.exe 4660 4d73339049bb1d49414ae4275b7f1694.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4660 4728 4d73339049bb1d49414ae4275b7f1694.exe 49 PID 4728 wrote to memory of 4660 4728 4d73339049bb1d49414ae4275b7f1694.exe 49 PID 4728 wrote to memory of 4660 4728 4d73339049bb1d49414ae4275b7f1694.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d73339049bb1d49414ae4275b7f1694.exe"C:\Users\Admin\AppData\Local\Temp\4d73339049bb1d49414ae4275b7f1694.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\4d73339049bb1d49414ae4275b7f1694.exeC:\Users\Admin\AppData\Local\Temp\4d73339049bb1d49414ae4275b7f1694.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5727bce16fa77769debfc4865d264dc00
SHA1bd391df486e1451b1c0cc09646c84a740e8e832a
SHA2566f3251918c775f66f1c8f65bbabfd11a65706f158323c17bc08a59ddda87e2bc
SHA512d6754f1ee38997b1e99f88e9a6daa07a843e687a5f6b1956f138905356e68d5f52514d1e87f4b81dca01952e32a0769590ddf4fd0d7840a01e0c9e530b4cd7d2