Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
53ca800aa9a8804ae4d697fb3818901e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53ca800aa9a8804ae4d697fb3818901e.exe
Resource
win10v2004-20231215-en
General
-
Target
53ca800aa9a8804ae4d697fb3818901e.exe
-
Size
385KB
-
MD5
53ca800aa9a8804ae4d697fb3818901e
-
SHA1
28d79bb42f74672f0b9c5b98ac1491bcf87e8558
-
SHA256
dea629be4857209a3a50ae870d22b93ca8e4692bd2af52d2d70cf7cfdfced664
-
SHA512
1cb10af85ad92ebb143f6a7d743c13398f469f8f42d30f6c60233615030a80972d1884abdaceb8f5df19d2562c651352b28f447a7f9663b701896d3c46902666
-
SSDEEP
6144:NwBGsDyBa2leh+R0u67vdV2ROhJ1oMWbqQvH17KdBUfhi+XpVGj0WArlCoe5B:NwdZzCV6HB31xWzedyT2jzws5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1216 53ca800aa9a8804ae4d697fb3818901e.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 53ca800aa9a8804ae4d697fb3818901e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4528 53ca800aa9a8804ae4d697fb3818901e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4528 53ca800aa9a8804ae4d697fb3818901e.exe 1216 53ca800aa9a8804ae4d697fb3818901e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1216 4528 53ca800aa9a8804ae4d697fb3818901e.exe 88 PID 4528 wrote to memory of 1216 4528 53ca800aa9a8804ae4d697fb3818901e.exe 88 PID 4528 wrote to memory of 1216 4528 53ca800aa9a8804ae4d697fb3818901e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\53ca800aa9a8804ae4d697fb3818901e.exe"C:\Users\Admin\AppData\Local\Temp\53ca800aa9a8804ae4d697fb3818901e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\53ca800aa9a8804ae4d697fb3818901e.exeC:\Users\Admin\AppData\Local\Temp\53ca800aa9a8804ae4d697fb3818901e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b9d3164c55370a6d6dd3d6b99fb719a7
SHA1662be9f3db71a6d63662be4cd519a4f5b31c42da
SHA256edbc81f986a7fa7dd5fbc10267b3b79cc42eae9901c4c8ffc488cdf3e7ea817a
SHA512a09681605f8f25d6dd244068daa57fe74f417c565c8301c24ab706db1762e75d367083d396657189588383ac75899346350f5895bb728f024ec0975903756f6c