Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
5c1da4ffc8cd761d2a669584df31f118.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c1da4ffc8cd761d2a669584df31f118.exe
Resource
win10v2004-20231215-en
General
-
Target
5c1da4ffc8cd761d2a669584df31f118.exe
-
Size
907KB
-
MD5
5c1da4ffc8cd761d2a669584df31f118
-
SHA1
4c7e85f248e4f59841a54324fae782696866c7be
-
SHA256
590bb9da1710bf3a2b7c5c1ecc6723eeb4571437bf9f4068188a14340f7f0b6f
-
SHA512
5de512758a76e2d0cc04c9e5e996cd0a1dd70f0246d4b7274bd63dd7050e891bfb2989994c63fdc57bf5244c52d2ec7fdd0cdd870c5c1638526332c830cbf91f
-
SSDEEP
24576:eyIeV49oJ2fr9S7GLZy26Z9sI0J6XEta/ZS1:eyI39oJ2fr9SSLZydXMJ5gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3572 5c1da4ffc8cd761d2a669584df31f118.exe -
Executes dropped EXE 1 IoCs
pid Process 3572 5c1da4ffc8cd761d2a669584df31f118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3300 5c1da4ffc8cd761d2a669584df31f118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3300 5c1da4ffc8cd761d2a669584df31f118.exe 3572 5c1da4ffc8cd761d2a669584df31f118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3572 3300 5c1da4ffc8cd761d2a669584df31f118.exe 88 PID 3300 wrote to memory of 3572 3300 5c1da4ffc8cd761d2a669584df31f118.exe 88 PID 3300 wrote to memory of 3572 3300 5c1da4ffc8cd761d2a669584df31f118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c1da4ffc8cd761d2a669584df31f118.exe"C:\Users\Admin\AppData\Local\Temp\5c1da4ffc8cd761d2a669584df31f118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\5c1da4ffc8cd761d2a669584df31f118.exeC:\Users\Admin\AppData\Local\Temp\5c1da4ffc8cd761d2a669584df31f118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD5b7d5be10098fa372f83344387b22666e
SHA1a7beb65c525cdcd944221e6a39b4b8d3bc967637
SHA2567a3b072a1352e4860878e04f3e660713b46b6f9978749fd2be5782adb0b8ca73
SHA5128762f9491e1225167c943a5a298044aedc06902afa96fe3a6a6e1bd1dccd8c4764d54b22ac1b3fab64ee9640a39ca44fd59c5cae14b086f333b7587ed8236921