Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
5a060e4d25aefd606515fc954e4383ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a060e4d25aefd606515fc954e4383ff.exe
Resource
win10v2004-20231222-en
General
-
Target
5a060e4d25aefd606515fc954e4383ff.exe
-
Size
385KB
-
MD5
5a060e4d25aefd606515fc954e4383ff
-
SHA1
ca64a2e4ef9a0466c4f82e8c935f3c2750e69d7f
-
SHA256
0f1a7b6bd4393dda8a9fbcffa0fc1a8d0f6578cc721b8eaa119754634cb9e88a
-
SHA512
8b5d8031d6d020838dce6fa05d452ecd93a77bddeb8072c8d54c1fe15e7d9187c12b7f7556986ffeb0c8e44593e07cac947de54765a0b0578dbe229494830565
-
SSDEEP
6144:u//Rzaoq/zfOqwxatODpljnc3H9vydvK29LEEl3yMhUb6kTceFZIT//AuPVB:upa5zfOqcKO03Nugk3yggFZv8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 996 5a060e4d25aefd606515fc954e4383ff.exe -
Executes dropped EXE 1 IoCs
pid Process 996 5a060e4d25aefd606515fc954e4383ff.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4208 5a060e4d25aefd606515fc954e4383ff.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4208 5a060e4d25aefd606515fc954e4383ff.exe 996 5a060e4d25aefd606515fc954e4383ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4208 wrote to memory of 996 4208 5a060e4d25aefd606515fc954e4383ff.exe 18 PID 4208 wrote to memory of 996 4208 5a060e4d25aefd606515fc954e4383ff.exe 18 PID 4208 wrote to memory of 996 4208 5a060e4d25aefd606515fc954e4383ff.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a060e4d25aefd606515fc954e4383ff.exe"C:\Users\Admin\AppData\Local\Temp\5a060e4d25aefd606515fc954e4383ff.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\5a060e4d25aefd606515fc954e4383ff.exeC:\Users\Admin\AppData\Local\Temp\5a060e4d25aefd606515fc954e4383ff.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD553461a85d5ec8bd46b67e8917d75cdcc
SHA1d022331f981283367b27c90e01137fbd5874111a
SHA256fcc45c8a82b1811170b21becaa738637708e55437f0129e7892ca9435bcd7f6c
SHA512e2bb18248eec5c301c204b9f9f0ff22ef958f8604e9458a078a58eb916570d163cef4e10fbd4a5a9896eb756b6b7580bd22e499aaabe92caadbff9f0d25b55e1