Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
58ea5b7234751da8d805ba9ea1b79c9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58ea5b7234751da8d805ba9ea1b79c9f.exe
Resource
win10v2004-20231222-en
General
-
Target
58ea5b7234751da8d805ba9ea1b79c9f.exe
-
Size
385KB
-
MD5
58ea5b7234751da8d805ba9ea1b79c9f
-
SHA1
4e89602fcc3412a8a3614f7fe1c9a0a82ef0db7d
-
SHA256
8385969f607b0d6076872215a9e97a1f8d26ee03da8eabeedd713c7ef916ced2
-
SHA512
7b511ff3e40ce8345ba4b553c0ffe9328d30e7c4d61d7c0b87685121538446bee8a9f73a1b0022015978b94e8c0ef19a039a0caec90c95867773a8f310c4a1b2
-
SSDEEP
6144:e+r13IIoLH0vyMiV/OrFknUDvAJy9HAtw7qPvUi3FrJBSt6/6GXGUjmB:dh3II8EMOrFyUDvHdOtz3FretVCtjmB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4916 58ea5b7234751da8d805ba9ea1b79c9f.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 58ea5b7234751da8d805ba9ea1b79c9f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4824 58ea5b7234751da8d805ba9ea1b79c9f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4824 58ea5b7234751da8d805ba9ea1b79c9f.exe 4916 58ea5b7234751da8d805ba9ea1b79c9f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4916 4824 58ea5b7234751da8d805ba9ea1b79c9f.exe 89 PID 4824 wrote to memory of 4916 4824 58ea5b7234751da8d805ba9ea1b79c9f.exe 89 PID 4824 wrote to memory of 4916 4824 58ea5b7234751da8d805ba9ea1b79c9f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ea5b7234751da8d805ba9ea1b79c9f.exe"C:\Users\Admin\AppData\Local\Temp\58ea5b7234751da8d805ba9ea1b79c9f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\58ea5b7234751da8d805ba9ea1b79c9f.exeC:\Users\Admin\AppData\Local\Temp\58ea5b7234751da8d805ba9ea1b79c9f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b6fa0371c087fc9eb7cd0c8fa42b0552
SHA15483e231e4f1516dbd442508b087cbd3aebc608e
SHA2564589a3cc033b9affcfa6d8de78a5b72b0bcbe984d08c0a8934bc9c8a0895ca2a
SHA512e539516b8c3306f4893d647e86203306fc58054c8171294f4e4bc5e3a631f8a46078b2134a2ca7bcb4b63f2fcca3981d5bff0ec46e3f964c014b1026f1ccdfdb