Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
5a1abbd9ea20051a54f5423a240b967c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a1abbd9ea20051a54f5423a240b967c.exe
Resource
win10v2004-20231215-en
General
-
Target
5a1abbd9ea20051a54f5423a240b967c.exe
-
Size
385KB
-
MD5
5a1abbd9ea20051a54f5423a240b967c
-
SHA1
89e07738f5cdd36c70a4e14182ad45b46a44a6d1
-
SHA256
edcefefdc8aa3d576f98a556d8ff6673143db1d415bf7b5d85b69a7ca0edd3c5
-
SHA512
c907adfc786d0ebfdfce9befa6349e06d5c8fac4f0fec21840ffe8f52a9180aee8108758fa683ffe9cd3703957ff6ee99e01c19c61ee1ef91d73e4527818dee0
-
SSDEEP
6144:CZZ9H45GqTC9G0E50ibukcworeH2TorrR64PvnGniHyGiLhPCcjekB:CZf4ImaG5Y1SeorI4PvnGniHVYFCcikB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3092 5a1abbd9ea20051a54f5423a240b967c.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 5a1abbd9ea20051a54f5423a240b967c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4892 5a1abbd9ea20051a54f5423a240b967c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4892 5a1abbd9ea20051a54f5423a240b967c.exe 3092 5a1abbd9ea20051a54f5423a240b967c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3092 4892 5a1abbd9ea20051a54f5423a240b967c.exe 91 PID 4892 wrote to memory of 3092 4892 5a1abbd9ea20051a54f5423a240b967c.exe 91 PID 4892 wrote to memory of 3092 4892 5a1abbd9ea20051a54f5423a240b967c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1abbd9ea20051a54f5423a240b967c.exe"C:\Users\Admin\AppData\Local\Temp\5a1abbd9ea20051a54f5423a240b967c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\5a1abbd9ea20051a54f5423a240b967c.exeC:\Users\Admin\AppData\Local\Temp\5a1abbd9ea20051a54f5423a240b967c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD551ef5ad87e6bf8037ba15168107b3cef
SHA1253862ac6c45069e21c714c604ec1c53dbf3cd72
SHA2562cecb4c76ddc0b12bc2988c5ce5e96f825285d86515f6ca77f607df4f6c2ec3f
SHA512322d76af2f313c7248d8a4adf1f8db56099f9e4cda942855a1579366d4dc24d939d805d548a50e83f564be2b63cb6c86d62021df59baed1db1c38465403565e3