Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
5931b3da3fd4aa31dd4ea470a121c78c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5931b3da3fd4aa31dd4ea470a121c78c.exe
Resource
win10v2004-20231215-en
General
-
Target
5931b3da3fd4aa31dd4ea470a121c78c.exe
-
Size
385KB
-
MD5
5931b3da3fd4aa31dd4ea470a121c78c
-
SHA1
67b5e382543740155128e33b62b16c99f196ac4e
-
SHA256
fe8fdcb176e6939517e7b9172a746f8cce7d50dd5118fad49cd5e99397092378
-
SHA512
543fd10ccf038b9fe2889474cfd9d6cc95e0b7019ac2bad7ec60f29daa09b4dee26758fa34a9bb45d728ea9fefb4543e8057bf9097e35042d357942c1a4ba60a
-
SSDEEP
12288:q1u2wCspGOsxSKc9b+E5QpcPADwiwXo/8QoWB:Gu2wCspRs0vNwE3FY0QDB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4924 5931b3da3fd4aa31dd4ea470a121c78c.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 5931b3da3fd4aa31dd4ea470a121c78c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4424 5931b3da3fd4aa31dd4ea470a121c78c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4424 5931b3da3fd4aa31dd4ea470a121c78c.exe 4924 5931b3da3fd4aa31dd4ea470a121c78c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4924 4424 5931b3da3fd4aa31dd4ea470a121c78c.exe 83 PID 4424 wrote to memory of 4924 4424 5931b3da3fd4aa31dd4ea470a121c78c.exe 83 PID 4424 wrote to memory of 4924 4424 5931b3da3fd4aa31dd4ea470a121c78c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5931b3da3fd4aa31dd4ea470a121c78c.exe"C:\Users\Admin\AppData\Local\Temp\5931b3da3fd4aa31dd4ea470a121c78c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\5931b3da3fd4aa31dd4ea470a121c78c.exeC:\Users\Admin\AppData\Local\Temp\5931b3da3fd4aa31dd4ea470a121c78c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD532d1dd793b62cf4b08d28b24396cdfa4
SHA1eaf9af1eed199ce3206a399cf073a3b9c13062e4
SHA2562de632ada9c45e39cf230f423a11543effa2ab4b88c9b84ff6e756254571cba2
SHA512869a0e192ffe97ec2e1c367b59b877e39cdaf04dbc5737a80c1a2c9d99a6a4a0a1a0d03c51d9bc72c4a5e12846c7119e662835c6e5153ce43288e5bbfc16baf4