Analysis
-
max time kernel
88s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
5c1c1ef936ea55e2b3044d3f81d742e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c1c1ef936ea55e2b3044d3f81d742e2.exe
Resource
win10v2004-20231215-en
General
-
Target
5c1c1ef936ea55e2b3044d3f81d742e2.exe
-
Size
385KB
-
MD5
5c1c1ef936ea55e2b3044d3f81d742e2
-
SHA1
909cab33c686cf2e72dada529d0411f834d0627a
-
SHA256
f76582fd23760954b5d70214fad0f30431784eee038344bd6379514910ea5a62
-
SHA512
7f3f3702856ac7cb1c5ee6bcb6057a6a7631c94aac85ff40654822210e8862a34bbcc6b1869a08e5b61c491e664a72c641dc9de96f5b0172b2234afec9e828dd
-
SSDEEP
12288:x+e5c18/achlpPRj+8oXIca9UjaJUCjpCHbLfL9eB:tODM+8oXIXAaWbNeB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 232 5c1c1ef936ea55e2b3044d3f81d742e2.exe -
Executes dropped EXE 1 IoCs
pid Process 232 5c1c1ef936ea55e2b3044d3f81d742e2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2696 5c1c1ef936ea55e2b3044d3f81d742e2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2696 5c1c1ef936ea55e2b3044d3f81d742e2.exe 232 5c1c1ef936ea55e2b3044d3f81d742e2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2696 wrote to memory of 232 2696 5c1c1ef936ea55e2b3044d3f81d742e2.exe 86 PID 2696 wrote to memory of 232 2696 5c1c1ef936ea55e2b3044d3f81d742e2.exe 86 PID 2696 wrote to memory of 232 2696 5c1c1ef936ea55e2b3044d3f81d742e2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c1c1ef936ea55e2b3044d3f81d742e2.exe"C:\Users\Admin\AppData\Local\Temp\5c1c1ef936ea55e2b3044d3f81d742e2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\5c1c1ef936ea55e2b3044d3f81d742e2.exeC:\Users\Admin\AppData\Local\Temp\5c1c1ef936ea55e2b3044d3f81d742e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5d18961c767c7894d9186a4777d853d2a
SHA1f4d265d750627c22f42365ac963b4872fb25d544
SHA2566e995400c24a579547ba93c1d25ba7f1cc927931b782378a4dea8df6e8d05a54
SHA51230748ffab25f488f472616a215eb5c15e580cfac75d71c9e140140a66a095977d80c7e411ae32a698f0f98e50705231027d1b3dc5998cd9387b60cde547790ab