Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
59634db4348765c088ad8ef293879ea0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59634db4348765c088ad8ef293879ea0.exe
Resource
win10v2004-20231215-en
General
-
Target
59634db4348765c088ad8ef293879ea0.exe
-
Size
385KB
-
MD5
59634db4348765c088ad8ef293879ea0
-
SHA1
09e25c15000fdd366516b8de9145910da8520054
-
SHA256
5c7dd91a2baea372d6546d1a4985d3ec34b3260f58907113d5a4f6a5a5a5a4f2
-
SHA512
d4977a6c841ea7ea1a4851038975e9eaea2b9454a68708b9247ae63c44b02e165b1cac28d181b75ab50cdfd5b65251b81e5074ca3a79739378b464fd7e97c4de
-
SSDEEP
6144:rmndAJXAY58O+Q3Ux9h6E9UQppEvVv8BI4TRm8jBg0xpbQdEkRj8hdHsMv/isB:Y0AYf3s6DvaBI4TlBg4pbOEcY/Dv6sB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 812 59634db4348765c088ad8ef293879ea0.exe -
Executes dropped EXE 1 IoCs
pid Process 812 59634db4348765c088ad8ef293879ea0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4700 59634db4348765c088ad8ef293879ea0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4700 59634db4348765c088ad8ef293879ea0.exe 812 59634db4348765c088ad8ef293879ea0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 812 4700 59634db4348765c088ad8ef293879ea0.exe 91 PID 4700 wrote to memory of 812 4700 59634db4348765c088ad8ef293879ea0.exe 91 PID 4700 wrote to memory of 812 4700 59634db4348765c088ad8ef293879ea0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\59634db4348765c088ad8ef293879ea0.exe"C:\Users\Admin\AppData\Local\Temp\59634db4348765c088ad8ef293879ea0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\59634db4348765c088ad8ef293879ea0.exeC:\Users\Admin\AppData\Local\Temp\59634db4348765c088ad8ef293879ea0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD59d4b81c0f2521fd8c3875157bd6c363a
SHA1d50e16078559d8eb511e9857e9ccb575c25b44ab
SHA25663173140aaeb8315ff3519b3dc75d9708602a9697bbacd996add3efbdacc6730
SHA512e728104c4590d02e4d443e259d130f700037526820d1ea3e712d011ae4314363d32bd444c4bae875b944e49320ecdec22d3808e6a482727097e5d58dfc3a9abe