Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 09:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4df336e0cdf812bf5bd09a7aa0cbc235.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4df336e0cdf812bf5bd09a7aa0cbc235.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
4df336e0cdf812bf5bd09a7aa0cbc235.exe
-
Size
385KB
-
MD5
4df336e0cdf812bf5bd09a7aa0cbc235
-
SHA1
6dc0f18f9af8df8831499cbf30dc3628f324b946
-
SHA256
0ff7b959a37b6e4812ea12287101e80642bcec8127ae21f5cdbb8e464a3f569c
-
SHA512
c265c5b69d6840e9e45c51ccf7a7d4605b0c89062e6d3cc094de267a2ea84a6788a5f5a2f16e6afa380ef4ab2316edfbfa8c8266e297cc88c526e93a77e09534
-
SSDEEP
12288:ChMFwZbSdn2wF6hCkR2mjh75H9aPw89riCN6TB:CcwZQ2PC45IPwS0B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3800 4df336e0cdf812bf5bd09a7aa0cbc235.exe -
Executes dropped EXE 1 IoCs
pid Process 3800 4df336e0cdf812bf5bd09a7aa0cbc235.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4808 4df336e0cdf812bf5bd09a7aa0cbc235.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4808 4df336e0cdf812bf5bd09a7aa0cbc235.exe 3800 4df336e0cdf812bf5bd09a7aa0cbc235.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3800 4808 4df336e0cdf812bf5bd09a7aa0cbc235.exe 17 PID 4808 wrote to memory of 3800 4808 4df336e0cdf812bf5bd09a7aa0cbc235.exe 17 PID 4808 wrote to memory of 3800 4808 4df336e0cdf812bf5bd09a7aa0cbc235.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df336e0cdf812bf5bd09a7aa0cbc235.exe"C:\Users\Admin\AppData\Local\Temp\4df336e0cdf812bf5bd09a7aa0cbc235.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\4df336e0cdf812bf5bd09a7aa0cbc235.exeC:\Users\Admin\AppData\Local\Temp\4df336e0cdf812bf5bd09a7aa0cbc235.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3800
-