Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 11:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6539047abba0cacbcac9c55c0864d704.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
6539047abba0cacbcac9c55c0864d704.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
6539047abba0cacbcac9c55c0864d704.exe
-
Size
385KB
-
MD5
6539047abba0cacbcac9c55c0864d704
-
SHA1
b80c1e68c2b265d15c01cb82f3c6e972cc789ed2
-
SHA256
9ba7815113994edcfad4fbf1418aa9f3ba5b7415aa7a1d08e12df22688cae170
-
SHA512
7a0e13dc32408b34d59bc3443306e1a744ee8fc678ee93456dd35647a09402992aa21f142da7fcad8c5be4f1b0a563dc7a58ca2fcd370c2974bf0c5e7a0b143e
-
SSDEEP
12288:iDM997P9Tm4PpG/K/lPKxEgWCmGPlLRBB:5L1Tm2EcPKxEgW4NB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4916 6539047abba0cacbcac9c55c0864d704.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 6539047abba0cacbcac9c55c0864d704.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 212 6539047abba0cacbcac9c55c0864d704.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 212 6539047abba0cacbcac9c55c0864d704.exe 4916 6539047abba0cacbcac9c55c0864d704.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 4916 212 6539047abba0cacbcac9c55c0864d704.exe 19 PID 212 wrote to memory of 4916 212 6539047abba0cacbcac9c55c0864d704.exe 19 PID 212 wrote to memory of 4916 212 6539047abba0cacbcac9c55c0864d704.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\6539047abba0cacbcac9c55c0864d704.exe"C:\Users\Admin\AppData\Local\Temp\6539047abba0cacbcac9c55c0864d704.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\6539047abba0cacbcac9c55c0864d704.exeC:\Users\Admin\AppData\Local\Temp\6539047abba0cacbcac9c55c0864d704.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4916
-