Analysis
-
max time kernel
114s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
4d8bf427629e77bae9fd5f34349c6e2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d8bf427629e77bae9fd5f34349c6e2d.exe
Resource
win10v2004-20231215-en
General
-
Target
4d8bf427629e77bae9fd5f34349c6e2d.exe
-
Size
385KB
-
MD5
4d8bf427629e77bae9fd5f34349c6e2d
-
SHA1
59e2f8cc7b3952d5ab3d260726b899967ab55af7
-
SHA256
1c32f664f2eb246ee0a25abee666d657548a27e3a12c5ed00415a52e249aabac
-
SHA512
b2fc640e6a4beab0422f224606f6f36c7e0941c9e3d337e57a64fa5561944c7ea08f531aa58b213554ba11f99304ab7a23154a8bb4d982b85a1108565a1b7a89
-
SSDEEP
6144:oEUm0zCRTu5R0hamLxVyuD4FheYnFUQcKXwJxYZIBoHGYje2Gi2bScK7UlSBB:Kmb9u5yVyusFheYFaKXHfmB2Gio+UwBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4320 4d8bf427629e77bae9fd5f34349c6e2d.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 4d8bf427629e77bae9fd5f34349c6e2d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 960 4d8bf427629e77bae9fd5f34349c6e2d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 960 4d8bf427629e77bae9fd5f34349c6e2d.exe 4320 4d8bf427629e77bae9fd5f34349c6e2d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 960 wrote to memory of 4320 960 4d8bf427629e77bae9fd5f34349c6e2d.exe 89 PID 960 wrote to memory of 4320 960 4d8bf427629e77bae9fd5f34349c6e2d.exe 89 PID 960 wrote to memory of 4320 960 4d8bf427629e77bae9fd5f34349c6e2d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d8bf427629e77bae9fd5f34349c6e2d.exe"C:\Users\Admin\AppData\Local\Temp\4d8bf427629e77bae9fd5f34349c6e2d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\4d8bf427629e77bae9fd5f34349c6e2d.exeC:\Users\Admin\AppData\Local\Temp\4d8bf427629e77bae9fd5f34349c6e2d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5ed201235071772b2effa0311dfef3c46
SHA1a478859f7fd8a56b38ff13fa96b18dbd2845e3fc
SHA2566123c715b3fee28c9f14df627f2a5f2d755246bab91fe9318b817966690285dd
SHA5122be27f9f18861b46d40c7d5b3c4f736cd653c5a6b8541ac9199fe4476da3d89ef4fd6c377d9979aa0e22c11fcfe8c12dee10eacb27a99ac4bcac17fbe9682f1b