Analysis
-
max time kernel
168s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
513526c7c60b87ba5692ae63d45d62de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
513526c7c60b87ba5692ae63d45d62de.exe
Resource
win10v2004-20231215-en
General
-
Target
513526c7c60b87ba5692ae63d45d62de.exe
-
Size
771KB
-
MD5
513526c7c60b87ba5692ae63d45d62de
-
SHA1
a2f82fcd023600186262bcd2946ed15154ff4854
-
SHA256
a7bea5e487e8b07d3f6d5418d3cbf5a41632c5037751ecf7dcda971ae18d1033
-
SHA512
69a7c9fca693444c52a0fc8d6f3f6b5cd2fda830dd8c0bcd30699b18a51d54f152bfd98bb9053e403afaec742784b4125e16d5d90f4cbeace8179a9e27504b90
-
SSDEEP
24576:wFAE8E6uOjhsybZWb10hJaothZ2/T6FBBB:ZSSKOZQ/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4456 513526c7c60b87ba5692ae63d45d62de.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 513526c7c60b87ba5692ae63d45d62de.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3660 513526c7c60b87ba5692ae63d45d62de.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3660 513526c7c60b87ba5692ae63d45d62de.exe 4456 513526c7c60b87ba5692ae63d45d62de.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4456 3660 513526c7c60b87ba5692ae63d45d62de.exe 95 PID 3660 wrote to memory of 4456 3660 513526c7c60b87ba5692ae63d45d62de.exe 95 PID 3660 wrote to memory of 4456 3660 513526c7c60b87ba5692ae63d45d62de.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\513526c7c60b87ba5692ae63d45d62de.exe"C:\Users\Admin\AppData\Local\Temp\513526c7c60b87ba5692ae63d45d62de.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\513526c7c60b87ba5692ae63d45d62de.exeC:\Users\Admin\AppData\Local\Temp\513526c7c60b87ba5692ae63d45d62de.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD56797fbd9227ed0ffa8d213852da1ff8c
SHA1f08b03cd2fba90e8f6cbc6bffc336388e716b581
SHA256e90c420727128aba629c1b69a8b26b95dfadc999c1ca1659d6503ef95c4e562c
SHA5124dcea9c468d490cb4527d1f862554a8bb9e3513a78b615007191ca5ac89d1ef2febc538319fa269502fc30d13b4bdb9ef846c92a58d53323952d7ce438770810