Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
64d43e5f11ce772cfd78c741f8af80a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64d43e5f11ce772cfd78c741f8af80a9.exe
Resource
win10v2004-20231215-en
General
-
Target
64d43e5f11ce772cfd78c741f8af80a9.exe
-
Size
907KB
-
MD5
64d43e5f11ce772cfd78c741f8af80a9
-
SHA1
30e31334aaa73c6bcbd9386ca92003d9de4ded69
-
SHA256
6abfe0c4e55faa9c11eed7cdb79c817f2b342523d42d7bb591635edc4bd70d5b
-
SHA512
0ec4ba9dee9b8b58a6523ecb62940a592594eb87982233c1dba7d01d633d14925a00db0faf1f4a24aabcc920050f376266bf9b0418126421e537f594a19d51fe
-
SSDEEP
12288:0BvXczsgdJK6u1d97j4ADLpe3OG0bY/aM+hFSfXzaIXknjOrsQkxjVDa/ZS1:0J4dJe1d97j4N3v00/aQnX2OrT6a/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1436 64d43e5f11ce772cfd78c741f8af80a9.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 64d43e5f11ce772cfd78c741f8af80a9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3012 64d43e5f11ce772cfd78c741f8af80a9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3012 64d43e5f11ce772cfd78c741f8af80a9.exe 1436 64d43e5f11ce772cfd78c741f8af80a9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1436 3012 64d43e5f11ce772cfd78c741f8af80a9.exe 89 PID 3012 wrote to memory of 1436 3012 64d43e5f11ce772cfd78c741f8af80a9.exe 89 PID 3012 wrote to memory of 1436 3012 64d43e5f11ce772cfd78c741f8af80a9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\64d43e5f11ce772cfd78c741f8af80a9.exe"C:\Users\Admin\AppData\Local\Temp\64d43e5f11ce772cfd78c741f8af80a9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\64d43e5f11ce772cfd78c741f8af80a9.exeC:\Users\Admin\AppData\Local\Temp\64d43e5f11ce772cfd78c741f8af80a9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5e95babfa69527fc7e93aa428e081eb99
SHA1015a4759b3429c0b280ce8931ed4cc025cd92877
SHA256195ab7ad73b2f59646319a062f554bf5883cca5c9d62c9cf7d7c2de5c4ad5d91
SHA512e23d2163b33c8620cbf1e02fca427523aea766a3a059ce669a484bd62bb796e021007dfb82204a34ae09f604bb4de1a3a150d50d2860b95f560c13cb62a4b8dd