Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
63bd230d4ffbf2f77393fcd6443d9916.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63bd230d4ffbf2f77393fcd6443d9916.exe
Resource
win10v2004-20231215-en
General
-
Target
63bd230d4ffbf2f77393fcd6443d9916.exe
-
Size
385KB
-
MD5
63bd230d4ffbf2f77393fcd6443d9916
-
SHA1
aecfbec89429ee4fc1390745ddbce40932f4a0ca
-
SHA256
ce1341438e8a54cd0e3ab75c8802c6fc026a4248afb7dcd6b039f5a9f8b545e5
-
SHA512
8dc98d99e66bb5405ec80fc0e562f5e0fca476e0e7a91a609ebb830993cc332a2bc043539d98a874769cb785a9d845323cf6607864f9bdd5799a08c6ac59bb1f
-
SSDEEP
12288:sI9PNa4G98a4/NalxupPnDJIAisELxQjRwN2MqZLUVBCbonpWuTrkpasnlhq86nI:sIg98j/WA2ukYHMI6IDdB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3160 63bd230d4ffbf2f77393fcd6443d9916.exe -
Executes dropped EXE 1 IoCs
pid Process 3160 63bd230d4ffbf2f77393fcd6443d9916.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4800 63bd230d4ffbf2f77393fcd6443d9916.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4800 63bd230d4ffbf2f77393fcd6443d9916.exe 3160 63bd230d4ffbf2f77393fcd6443d9916.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3160 4800 63bd230d4ffbf2f77393fcd6443d9916.exe 54 PID 4800 wrote to memory of 3160 4800 63bd230d4ffbf2f77393fcd6443d9916.exe 54 PID 4800 wrote to memory of 3160 4800 63bd230d4ffbf2f77393fcd6443d9916.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\63bd230d4ffbf2f77393fcd6443d9916.exe"C:\Users\Admin\AppData\Local\Temp\63bd230d4ffbf2f77393fcd6443d9916.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\63bd230d4ffbf2f77393fcd6443d9916.exeC:\Users\Admin\AppData\Local\Temp\63bd230d4ffbf2f77393fcd6443d9916.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD524e0d6d380d439b3a97ba1322dcf975c
SHA17e818e0a7fc113836a3e92f34d1e2850c465ff4b
SHA2567947b6cef46575f960af8aeb0a208cbdec06c9b832daca4bd9db58e27a7f2bff
SHA512e5908f5dfb7af280d1707798579198186d82fd36cd9d04ec3926ec0c6b4abbef33891844dcb8e5aa9e570c404586b065aa9689fc97b062e2f14f8d9e09b84d51