Analysis
-
max time kernel
154s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
53e1e9fd39750e92d66483f4a267bef1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e1e9fd39750e92d66483f4a267bef1.exe
Resource
win10v2004-20231215-en
General
-
Target
53e1e9fd39750e92d66483f4a267bef1.exe
-
Size
385KB
-
MD5
53e1e9fd39750e92d66483f4a267bef1
-
SHA1
9b0ef069debb4f8755258c567a8f281ee3fd0e48
-
SHA256
e54694b364cdc3b8c46a51ef0b5832ab8bee17b57009d391508a2b256d7e4c6b
-
SHA512
bea467a2e289fff2b83f9290bd6c938cc85f5c96046f634857082429cb6031d12bc4a6d06ddff6af60b74c0acef45e1ec81dd1817b644222fb2b34297e6a89bf
-
SSDEEP
6144:A0wEAGbeLUtYUl/gHhtcVYwuQdD0er6iurO+l+K293hptea6e0G6jeNB:AEPEUXMhWqtQdD0euiOORt/0a6DG8OB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4856 53e1e9fd39750e92d66483f4a267bef1.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 53e1e9fd39750e92d66483f4a267bef1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4788 53e1e9fd39750e92d66483f4a267bef1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4788 53e1e9fd39750e92d66483f4a267bef1.exe 4856 53e1e9fd39750e92d66483f4a267bef1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4856 4788 53e1e9fd39750e92d66483f4a267bef1.exe 90 PID 4788 wrote to memory of 4856 4788 53e1e9fd39750e92d66483f4a267bef1.exe 90 PID 4788 wrote to memory of 4856 4788 53e1e9fd39750e92d66483f4a267bef1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e1e9fd39750e92d66483f4a267bef1.exe"C:\Users\Admin\AppData\Local\Temp\53e1e9fd39750e92d66483f4a267bef1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\53e1e9fd39750e92d66483f4a267bef1.exeC:\Users\Admin\AppData\Local\Temp\53e1e9fd39750e92d66483f4a267bef1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD561f5c33791c7fe1208510d718af55e07
SHA1c0bf71ced204b8e82373e13d32b3cf8afc061e8b
SHA2561678c5891b2bae403356492da2ef3785820c6d57c4a18c1758eeef8ce04c5339
SHA51290b1dbef5418eeb3e088491dd42d88a95f4ff9e35ab4d7ac37c7e31a77b7d6849252faf8412fe29adabb4b42e7e1f99078a553f3bfe6b73843b81afd061f6ba5