Analysis
-
max time kernel
150s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
5a7118ee7974e2cd84e4c97d9d178d35.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a7118ee7974e2cd84e4c97d9d178d35.exe
Resource
win10v2004-20231215-en
General
-
Target
5a7118ee7974e2cd84e4c97d9d178d35.exe
-
Size
385KB
-
MD5
5a7118ee7974e2cd84e4c97d9d178d35
-
SHA1
aed3b3a51167a6051c9656a20016b259069acb98
-
SHA256
3521a1664a720910cb232ab1315ad9c4f67a62e09f9ef648ea5948e1da6e4a65
-
SHA512
d120d48f97721a799813f66df5ec1d1489f2297c527ed411885956c720cf6bdfb9d82317b1ff53e6faa989b4b9c0e2b80e5eb83fc8a622e6842560cd2f5d8ed6
-
SSDEEP
6144:aoKPBhkE2dn9o5NIOcgj51Xs4ZFmO6dvtzuLDIv6MKl1IB1Gl/NJelP6jzhB:aoIP2dngd1c47m/8Lw6/l1610NJelCJB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3104 5a7118ee7974e2cd84e4c97d9d178d35.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 5a7118ee7974e2cd84e4c97d9d178d35.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5040 5a7118ee7974e2cd84e4c97d9d178d35.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5040 5a7118ee7974e2cd84e4c97d9d178d35.exe 3104 5a7118ee7974e2cd84e4c97d9d178d35.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3104 5040 5a7118ee7974e2cd84e4c97d9d178d35.exe 89 PID 5040 wrote to memory of 3104 5040 5a7118ee7974e2cd84e4c97d9d178d35.exe 89 PID 5040 wrote to memory of 3104 5040 5a7118ee7974e2cd84e4c97d9d178d35.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a7118ee7974e2cd84e4c97d9d178d35.exe"C:\Users\Admin\AppData\Local\Temp\5a7118ee7974e2cd84e4c97d9d178d35.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\5a7118ee7974e2cd84e4c97d9d178d35.exeC:\Users\Admin\AppData\Local\Temp\5a7118ee7974e2cd84e4c97d9d178d35.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD593c67b453fcd58c8789174e6b578a91a
SHA1d208ea0002ec3ae404aed9c912260db2dee5bfbb
SHA256ed592ff4c41ce9c18b8babc73a7a2f9b770e187711506a6f8f0e9e9628ca354d
SHA512288275aa4e96fd8fdc797efc28aa619b371003dae276b3eef378b7db54d28679e47f75bb62a35cfd84bf95a51b8754c34eff011e0d211d883fbf9eb1fee65f2f