Analysis
-
max time kernel
83s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
5bda20e8c482c63f43db6a96165a36f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bda20e8c482c63f43db6a96165a36f8.exe
Resource
win10v2004-20231215-en
General
-
Target
5bda20e8c482c63f43db6a96165a36f8.exe
-
Size
907KB
-
MD5
5bda20e8c482c63f43db6a96165a36f8
-
SHA1
03a43f299835395e11ed13715f1a97c5fd1c2a2b
-
SHA256
b431b5b2d37e110322e5d6b1d88b4e959996673300b6ceafdbe15fb79be7d1b1
-
SHA512
e857f899363d105b476b07cf6513cee5c8427c3c9a972ef427929f0ea15ee47022bc3b8d173edfd0d69c81ba0e411415635749624a56fc03e3cd54c98354be48
-
SSDEEP
24576:V839POUMB32Dtn9/8Tln4TShdoela/ZS1:VCPOU232DtgnDhC6gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 5bda20e8c482c63f43db6a96165a36f8.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 5bda20e8c482c63f43db6a96165a36f8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3276 5bda20e8c482c63f43db6a96165a36f8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3276 5bda20e8c482c63f43db6a96165a36f8.exe 3292 5bda20e8c482c63f43db6a96165a36f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3292 3276 5bda20e8c482c63f43db6a96165a36f8.exe 87 PID 3276 wrote to memory of 3292 3276 5bda20e8c482c63f43db6a96165a36f8.exe 87 PID 3276 wrote to memory of 3292 3276 5bda20e8c482c63f43db6a96165a36f8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bda20e8c482c63f43db6a96165a36f8.exe"C:\Users\Admin\AppData\Local\Temp\5bda20e8c482c63f43db6a96165a36f8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\5bda20e8c482c63f43db6a96165a36f8.exeC:\Users\Admin\AppData\Local\Temp\5bda20e8c482c63f43db6a96165a36f8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5616c0ccd6b3312e5b1dffceffe8f218e
SHA1b81d72315e5783435d57edba7dbbaf1c70a72354
SHA256c34005a4ac0bd8be0a2717039efae3ecfd6865e2447f8ac98b14cec0121ffbc7
SHA5125d309d720689e98e3855759378bba283ea26be13cf3b30eaeee2ce89d2ddd15e04cfa9af4d8c607441f378834619591938bbfdfd0f69840d897a7e286497bb8c