Analysis
-
max time kernel
4s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
4fb8238392f5620233751ecde4092b84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fb8238392f5620233751ecde4092b84.exe
Resource
win10v2004-20231215-en
General
-
Target
4fb8238392f5620233751ecde4092b84.exe
-
Size
771KB
-
MD5
4fb8238392f5620233751ecde4092b84
-
SHA1
08bc114fff86109bbb4169ca4ac1eb770a9bf680
-
SHA256
b90718d8bddbcc9b4acbbcc7b8732d0f7f424a065b29a78545a741636d1ee877
-
SHA512
f3c29ed8755419781df04cc61f435e48c4079d478bc5a1bba81b58a00b60ace0deeddad2f09c8ddd95eb1582ccf4e652f34cc4203f989462d95dbd12b599ae8f
-
SSDEEP
24576:ixuoMBMIdW+xD0I6hRozTCPtb10hJaothZ2/T6FBBB:ixuoMBMIdt0I6hRKTKB/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1932 4fb8238392f5620233751ecde4092b84.exe -
Executes dropped EXE 1 IoCs
pid Process 1932 4fb8238392f5620233751ecde4092b84.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 4fb8238392f5620233751ecde4092b84.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2004 4fb8238392f5620233751ecde4092b84.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2004 4fb8238392f5620233751ecde4092b84.exe 1932 4fb8238392f5620233751ecde4092b84.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1932 2004 4fb8238392f5620233751ecde4092b84.exe 16 PID 2004 wrote to memory of 1932 2004 4fb8238392f5620233751ecde4092b84.exe 16 PID 2004 wrote to memory of 1932 2004 4fb8238392f5620233751ecde4092b84.exe 16 PID 2004 wrote to memory of 1932 2004 4fb8238392f5620233751ecde4092b84.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb8238392f5620233751ecde4092b84.exeC:\Users\Admin\AppData\Local\Temp\4fb8238392f5620233751ecde4092b84.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1932
-
C:\Users\Admin\AppData\Local\Temp\4fb8238392f5620233751ecde4092b84.exe"C:\Users\Admin\AppData\Local\Temp\4fb8238392f5620233751ecde4092b84.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
13KB
MD5ebf7dfd5b092be4aa6d60c582883dd31
SHA18d26a22a61ffb998f187da5af935bb1023b9a688
SHA2561649c2d05c3c677b29e4fa58653ba019b42ac11525e0af7ad2cdb167e2902e80
SHA512da5da506e1c61f34ec2887c77c827518ab364b23d894ad1d21bb61fc71d94dc84465ab5cdd3c771ac6d3511680f90deeba5f252be36e66c9a6d2759a5706c825
-
Filesize
22KB
MD5a7d7cae1da39849f55d7eb414a334568
SHA199b14985176862765917c3e0895c01ae7de5297c
SHA2560321e623c1cfe5d61afe1bb7841eeddf7a51036a3b38bcb0d827ac5e4af7756b
SHA512ec73980cb92835db8e064538b7e12e0cf9a1a4d4deddbe22a0237409d04338d62570d10f15e669092c5683b75304313b1d4b11b90475913ec258a473e75e7792
-
Filesize
113KB
MD5ad71c968c55378a0e374808dd2b4ea93
SHA10b0c30d3f4d420913e4d37a8bb9d150a0e91712a
SHA256e6edd6a2f966d2bc196d774c6a3258f04b64cafd96ce9727ae6e6dcfb36fd1cd
SHA51289cd7259e459ded41a1698777add54a4048f3e501f20bdad0c7c12640e82e4b6692088435357393aa0c57a94a575488a112cc97c8ef2b2be980df11a5d9ace7c