Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
58f7f560a57555d0feb8facc916164e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58f7f560a57555d0feb8facc916164e1.exe
Resource
win10v2004-20231215-en
General
-
Target
58f7f560a57555d0feb8facc916164e1.exe
-
Size
385KB
-
MD5
58f7f560a57555d0feb8facc916164e1
-
SHA1
dfb49f75b9e24906fa8b77ed5770b0930c0628bf
-
SHA256
7a853946186189b0a5b3d682118c441de96a2af07b0a6becde40a22268d42cc9
-
SHA512
1e6465053a941809a31a05e18863e8c9e3539ed4c67234f093d13cc0f18db2bdff8805660b9b36d70c4861842a42da4d6c3de53fac022787e06afa07ddeff8f6
-
SSDEEP
12288:iDQyjeluS6lCFgApTDsy8JYRg+++nP3zyLJE23MA6kB:yjGL65asynq89wdB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1848 58f7f560a57555d0feb8facc916164e1.exe -
Executes dropped EXE 1 IoCs
pid Process 1848 58f7f560a57555d0feb8facc916164e1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1788 58f7f560a57555d0feb8facc916164e1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1788 58f7f560a57555d0feb8facc916164e1.exe 1848 58f7f560a57555d0feb8facc916164e1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1848 1788 58f7f560a57555d0feb8facc916164e1.exe 87 PID 1788 wrote to memory of 1848 1788 58f7f560a57555d0feb8facc916164e1.exe 87 PID 1788 wrote to memory of 1848 1788 58f7f560a57555d0feb8facc916164e1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f7f560a57555d0feb8facc916164e1.exe"C:\Users\Admin\AppData\Local\Temp\58f7f560a57555d0feb8facc916164e1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\58f7f560a57555d0feb8facc916164e1.exeC:\Users\Admin\AppData\Local\Temp\58f7f560a57555d0feb8facc916164e1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD565cd92340288d490c4e7c96ebe56080a
SHA1395c58f73ab0144cb021868ff43bd9df08df3341
SHA256d5361757fad1a5eedf17bad414deb8a7f2e5af621041fc69565574a971126d63
SHA5128257a3799b97360165f83384489e04f906027ee07ffbca62cd4c839a2e3ad2b1c4877108fd3c28c72d16c1471c236fbfd361c5c7a2bef6bf5cdd8649ebc1266d