Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
661614c780b1f321d673e8cef896f315.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
661614c780b1f321d673e8cef896f315.exe
Resource
win10v2004-20231215-en
General
-
Target
661614c780b1f321d673e8cef896f315.exe
-
Size
907KB
-
MD5
661614c780b1f321d673e8cef896f315
-
SHA1
eed4bee978917f070ecd2a5f1e73afc64eb26423
-
SHA256
6dfff1fab32535c2f9b9530a81c9f7c4d06d568a5981e51faab3c6dcf39fbfbe
-
SHA512
78a043f55d73596ee844a25f9dce0be0b35ebf854397415fe0b185f6d9b5dc05e0e91f8f3a79ecabf768ea7ed168c5a1cc9c85f2b8e02c51d5b41cbe595426bf
-
SSDEEP
24576:VJoAsl64HDu+EsLcFThwBUoKRoWrgqz1Vla/ZS1:FsTa+9QKBUvZ3gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 760 661614c780b1f321d673e8cef896f315.exe -
Executes dropped EXE 1 IoCs
pid Process 760 661614c780b1f321d673e8cef896f315.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 912 661614c780b1f321d673e8cef896f315.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 912 661614c780b1f321d673e8cef896f315.exe 760 661614c780b1f321d673e8cef896f315.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 912 wrote to memory of 760 912 661614c780b1f321d673e8cef896f315.exe 90 PID 912 wrote to memory of 760 912 661614c780b1f321d673e8cef896f315.exe 90 PID 912 wrote to memory of 760 912 661614c780b1f321d673e8cef896f315.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\661614c780b1f321d673e8cef896f315.exe"C:\Users\Admin\AppData\Local\Temp\661614c780b1f321d673e8cef896f315.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\661614c780b1f321d673e8cef896f315.exeC:\Users\Admin\AppData\Local\Temp\661614c780b1f321d673e8cef896f315.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD59c29d4b1413a59468fdd25a299da5f3e
SHA1409239fdf36c3a2e4da40a01b927588686c10c14
SHA256484f4a384e398067449649b12cb87b26716642d7448d3a369f2c85ff8fc35ca0
SHA512bcda18d59c6ec0b2b960d077fdda836e2db68f2769171c8b94e89d40e2eab7f7ee920a0ac832be76e8553a24eb5ff490b723dc2e9b6fd835eff0dc638a130f40