Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
5bf6ae705eb14804caa4a609ff973b87.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bf6ae705eb14804caa4a609ff973b87.exe
Resource
win10v2004-20231215-en
General
-
Target
5bf6ae705eb14804caa4a609ff973b87.exe
-
Size
385KB
-
MD5
5bf6ae705eb14804caa4a609ff973b87
-
SHA1
9e4d9d894f1b0092ea88ee0f839630f011ef7a8f
-
SHA256
c892d918ed538c10ed6dd0470f94b8267c2b23c154d5a94756f162f4812fce35
-
SHA512
2e696c93021369dc7710e82a131ec737fcfb5862a71cbbff412413aadcb9ba371bceac082c357d417b5973642c058ae0cbfb5e2d62816b4bff4c9e0ad30b1e32
-
SSDEEP
6144:PfnNk4SSfBN7PK1j5uKkdt6G9v7Tg6rY4OlC5YHx0MnNa7ephEtBaXH9xcB:Pva4Nz6j5mzBgyPOlC5+eXC0kXXcB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4876 5bf6ae705eb14804caa4a609ff973b87.exe -
Executes dropped EXE 1 IoCs
pid Process 4876 5bf6ae705eb14804caa4a609ff973b87.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1412 5bf6ae705eb14804caa4a609ff973b87.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1412 5bf6ae705eb14804caa4a609ff973b87.exe 4876 5bf6ae705eb14804caa4a609ff973b87.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4876 1412 5bf6ae705eb14804caa4a609ff973b87.exe 88 PID 1412 wrote to memory of 4876 1412 5bf6ae705eb14804caa4a609ff973b87.exe 88 PID 1412 wrote to memory of 4876 1412 5bf6ae705eb14804caa4a609ff973b87.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf6ae705eb14804caa4a609ff973b87.exe"C:\Users\Admin\AppData\Local\Temp\5bf6ae705eb14804caa4a609ff973b87.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\5bf6ae705eb14804caa4a609ff973b87.exeC:\Users\Admin\AppData\Local\Temp\5bf6ae705eb14804caa4a609ff973b87.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD5baeeeebcbd354a0f6856c4e2a2ac9106
SHA19063f79320c4dc1cccb1887c86bf9dcebac71b6c
SHA2566fa41983fac3dcdb9dd94a045a91de87e0872de72d481090e9594776ef7754d0
SHA5125dfd3b4ab2d12b089e8e2e088255f5d60a704282a98107ccf1b28cca62b90b318f7f7a801479f6d5f459a7d3977e3d1cccc0446a68a2c2e55c46e8046e41a9de