Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
657d7c1abad5c0557a8d406fa15d1bfb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
657d7c1abad5c0557a8d406fa15d1bfb.exe
Resource
win10v2004-20231222-en
General
-
Target
657d7c1abad5c0557a8d406fa15d1bfb.exe
-
Size
907KB
-
MD5
657d7c1abad5c0557a8d406fa15d1bfb
-
SHA1
37bddd375690d38a7013ccfe40814cd44cdc87fd
-
SHA256
d14fec933bf976f1cbefcc39e41d148d2f716afab423ae8c77724df793a7d14f
-
SHA512
94d1893743ba4ea24f40e4e410837004550754b23cb713b1a2a02326ed3a944c8de41e3c59004f55fd2958d2203557ac6a66c46a2a3e380f9f632a0d6547d77e
-
SSDEEP
12288:6B5cV01G6xGkTDPJBzhSfF+G1lwKI9hzALGnJ8+yKhvm5P6u4jVDa/ZS1:6B5cVH6xBTrzE21A6nJd5hmdUa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 804 657d7c1abad5c0557a8d406fa15d1bfb.exe -
Executes dropped EXE 1 IoCs
pid Process 804 657d7c1abad5c0557a8d406fa15d1bfb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3916 657d7c1abad5c0557a8d406fa15d1bfb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3916 657d7c1abad5c0557a8d406fa15d1bfb.exe 804 657d7c1abad5c0557a8d406fa15d1bfb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 804 3916 657d7c1abad5c0557a8d406fa15d1bfb.exe 42 PID 3916 wrote to memory of 804 3916 657d7c1abad5c0557a8d406fa15d1bfb.exe 42 PID 3916 wrote to memory of 804 3916 657d7c1abad5c0557a8d406fa15d1bfb.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\657d7c1abad5c0557a8d406fa15d1bfb.exe"C:\Users\Admin\AppData\Local\Temp\657d7c1abad5c0557a8d406fa15d1bfb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\657d7c1abad5c0557a8d406fa15d1bfb.exeC:\Users\Admin\AppData\Local\Temp\657d7c1abad5c0557a8d406fa15d1bfb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
737KB
MD563b9012671e4b9e23ac6fb5ac9214faa
SHA187e2f3ff334acb1fba8dde1a27dde8c8da3fdd8f
SHA2568fa2c7029526183547a797e092069cb56a2a113c326221ded5cc0a19e15360da
SHA5125b4ed844a088e4560f52be47d680d93d6c60b3c57906125575f5966d8f667ab3a547a3b1ac276b78501170093b2c14a634ea1dc49ba9258a7da60e3bcd9868ad