Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
58d87063ee6d79ab4cf8fad273ed7016.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58d87063ee6d79ab4cf8fad273ed7016.exe
Resource
win10v2004-20231222-en
General
-
Target
58d87063ee6d79ab4cf8fad273ed7016.exe
-
Size
385KB
-
MD5
58d87063ee6d79ab4cf8fad273ed7016
-
SHA1
c06d40ef8d1535540a01bf1ecb13155a58656c24
-
SHA256
7b7bd993ecb4ae3fadc6f9d2fee16175f8dd3586208e44f26f2b31058a8089aa
-
SHA512
c4db212f221e093ce950d9ac18f00e8a68c23c654b9e190cd78859163a665411d9c0ade87d3c8785355d9e8c7e2a35988752a04c185baa68bec37a4457ff6261
-
SSDEEP
12288:c8GFci2IUZLTqQIdumacFZ/5qb+QcvNC4wFpNNDQKXB:c8GFci2IUZLbIFVrq8/w3fDfXB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5264 58d87063ee6d79ab4cf8fad273ed7016.exe -
Executes dropped EXE 1 IoCs
pid Process 5264 58d87063ee6d79ab4cf8fad273ed7016.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1344 58d87063ee6d79ab4cf8fad273ed7016.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1344 58d87063ee6d79ab4cf8fad273ed7016.exe 5264 58d87063ee6d79ab4cf8fad273ed7016.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 5264 1344 58d87063ee6d79ab4cf8fad273ed7016.exe 23 PID 1344 wrote to memory of 5264 1344 58d87063ee6d79ab4cf8fad273ed7016.exe 23 PID 1344 wrote to memory of 5264 1344 58d87063ee6d79ab4cf8fad273ed7016.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d87063ee6d79ab4cf8fad273ed7016.exe"C:\Users\Admin\AppData\Local\Temp\58d87063ee6d79ab4cf8fad273ed7016.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\58d87063ee6d79ab4cf8fad273ed7016.exeC:\Users\Admin\AppData\Local\Temp\58d87063ee6d79ab4cf8fad273ed7016.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD54c97793061c5bc608b985c03cd9be02f
SHA15194730ff4fb84d369aae6c4e41bc68377517268
SHA256f2c8c4ecf95cede42768610b450cb1b978d0f48b9061944d78f9548aa9918130
SHA512e5e7fd9774c426b4bf54e9d266e6a7df73efda1edbe755d7422b6103e97fe6f3668cfb52323ba52a8be5cfe797d3b120e30576352eed746679e114e1592a6c40