Analysis
-
max time kernel
134s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
57e94459d9acf66fec85505241b43b1e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57e94459d9acf66fec85505241b43b1e.exe
Resource
win10v2004-20231215-en
General
-
Target
57e94459d9acf66fec85505241b43b1e.exe
-
Size
385KB
-
MD5
57e94459d9acf66fec85505241b43b1e
-
SHA1
8ca7c3842033db2da89dd06238e9cc7a2b86dc0a
-
SHA256
c14394b59c875b7ec19feb2ea74d80ef51b3e2d7280d7f4aa61bf936aebb45c6
-
SHA512
577128de9b832e3de87cd1304e270f7a3ed7bfc348c1ef3e141526c2b66457d8f4defdde7c8e34b3df86026f901acba4d0c8dd0459f720761dac0b30b1ac3f3a
-
SSDEEP
6144:8prUCaOyZszfHbIPDpyPEqKRhGaJDeAsHrnFnmABtu9n1/TUggV81WjbPJxhqRum:8pjaOyyf7IF4KRh3JbAD6nVw3YWJDGtB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 324 57e94459d9acf66fec85505241b43b1e.exe -
Executes dropped EXE 1 IoCs
pid Process 324 57e94459d9acf66fec85505241b43b1e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3180 57e94459d9acf66fec85505241b43b1e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3180 57e94459d9acf66fec85505241b43b1e.exe 324 57e94459d9acf66fec85505241b43b1e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 324 3180 57e94459d9acf66fec85505241b43b1e.exe 88 PID 3180 wrote to memory of 324 3180 57e94459d9acf66fec85505241b43b1e.exe 88 PID 3180 wrote to memory of 324 3180 57e94459d9acf66fec85505241b43b1e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e94459d9acf66fec85505241b43b1e.exe"C:\Users\Admin\AppData\Local\Temp\57e94459d9acf66fec85505241b43b1e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\57e94459d9acf66fec85505241b43b1e.exeC:\Users\Admin\AppData\Local\Temp\57e94459d9acf66fec85505241b43b1e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d6647475d07b1f94940d2ca06a72f57e
SHA12142e7494c53b8ec98321625d4b32b25c9d0e8c2
SHA256cd2f8e94b4a5513505fbf5e4a5911ffb14a6c2a4913d00e69f53b1214786e9c3
SHA512fb3a5e47491392701829eeb41b29603992a7fb7067d451d39faba9964b2181ff2d0309daf8bb788dd1c21e890a3cd2a322eecaa4843832efe3a8a73a11b4fcb9