Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
5afb655469d1fdcd25f79db4fe07bb91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5afb655469d1fdcd25f79db4fe07bb91.exe
Resource
win10v2004-20231215-en
General
-
Target
5afb655469d1fdcd25f79db4fe07bb91.exe
-
Size
771KB
-
MD5
5afb655469d1fdcd25f79db4fe07bb91
-
SHA1
361fab61f6cc171fc0ec1ce2bb5600b524d30351
-
SHA256
709167379ac2074ee1f9098f122faafd1a9cba3d75b36e8a0fbf8a34c1805c1f
-
SHA512
723fdf18d2cdb7271fa0ba025720f2978f6682d186142724e097b6fe3d9f3be89d39232f4349610a725c85a3ae2f15b07116e766f9474b607bb80b7a00f86d4c
-
SSDEEP
12288:2Sf6j77CLTu06Yig+rEqvMkUxe2aWob10VHmDXTuFaa2AtyGTKOF25ZoJJyhRgeG:DGjMuYqvoeQob10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3608 5afb655469d1fdcd25f79db4fe07bb91.exe -
Executes dropped EXE 1 IoCs
pid Process 3608 5afb655469d1fdcd25f79db4fe07bb91.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3052 5afb655469d1fdcd25f79db4fe07bb91.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3052 5afb655469d1fdcd25f79db4fe07bb91.exe 3608 5afb655469d1fdcd25f79db4fe07bb91.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3608 3052 5afb655469d1fdcd25f79db4fe07bb91.exe 89 PID 3052 wrote to memory of 3608 3052 5afb655469d1fdcd25f79db4fe07bb91.exe 89 PID 3052 wrote to memory of 3608 3052 5afb655469d1fdcd25f79db4fe07bb91.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5afb655469d1fdcd25f79db4fe07bb91.exe"C:\Users\Admin\AppData\Local\Temp\5afb655469d1fdcd25f79db4fe07bb91.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\5afb655469d1fdcd25f79db4fe07bb91.exeC:\Users\Admin\AppData\Local\Temp\5afb655469d1fdcd25f79db4fe07bb91.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5e9da0002f2621683cffbde752b6d6797
SHA1c7628cfb6167f163e06f212aa647c44cd675a374
SHA256784f3524a1e37f4930ab41e7fde6952c7b0a1e9c15c5de0c9cccaff796c77dce
SHA512af7841ef17103cd55c68e0d1b904d94ab00beddbc5e2a395ac440f80671d78dc2894c84bd8f402ccef2f5d93d2dd2566486752103d54b5e43139a98d01745c0c