Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
55040ccb71530a14f8af14ac05bcb332.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55040ccb71530a14f8af14ac05bcb332.exe
Resource
win10v2004-20231215-en
General
-
Target
55040ccb71530a14f8af14ac05bcb332.exe
-
Size
385KB
-
MD5
55040ccb71530a14f8af14ac05bcb332
-
SHA1
beee22a6c701c607e75fa2d47e45a23442f38f76
-
SHA256
579523ee78917b006f94ac1ea2b21cfd1fb69c6690d1b175adec9cd19cf57a25
-
SHA512
7ab1c3cac4476c8bd22e1ba1d43a461546e5251ee028473ef56085593b157f7c550730c1605dd0897d9cc429deef1ecba1d61d2221feb63bb52eecffb024834a
-
SSDEEP
6144:YHWnIQb9PcLzPZRWWlaUkdGIvIr66AghaF/DhiRtJgd3gDV74QFghpwsJ2A4yB:Y2/wPyWkUWIVg/Dhib8gR74QFghf8pyB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3252 55040ccb71530a14f8af14ac05bcb332.exe -
Executes dropped EXE 1 IoCs
pid Process 3252 55040ccb71530a14f8af14ac05bcb332.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4452 55040ccb71530a14f8af14ac05bcb332.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4452 55040ccb71530a14f8af14ac05bcb332.exe 3252 55040ccb71530a14f8af14ac05bcb332.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3252 4452 55040ccb71530a14f8af14ac05bcb332.exe 88 PID 4452 wrote to memory of 3252 4452 55040ccb71530a14f8af14ac05bcb332.exe 88 PID 4452 wrote to memory of 3252 4452 55040ccb71530a14f8af14ac05bcb332.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\55040ccb71530a14f8af14ac05bcb332.exe"C:\Users\Admin\AppData\Local\Temp\55040ccb71530a14f8af14ac05bcb332.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\55040ccb71530a14f8af14ac05bcb332.exeC:\Users\Admin\AppData\Local\Temp\55040ccb71530a14f8af14ac05bcb332.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5bc8d1dd8d1ff89c703424065c81a5dbb
SHA13f0e6aef73afa1b52b6dce5042d85ebbf377e56a
SHA256cc8c8bbd5fd923b6dd579aaf693f88d952fd55316ef5e2efdcd85a959ce7c419
SHA51249dd9381bc3a4765c6e5a2331b6e8ced62aa8be31f1a86d8df707956d9e08f6aed5492b720043594d57520ac8b0bc8903671de81ff5f59d39e95be47b8ef877e