Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
65d696b361551816241d8e2ba9b4e536.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65d696b361551816241d8e2ba9b4e536.exe
Resource
win10v2004-20231215-en
General
-
Target
65d696b361551816241d8e2ba9b4e536.exe
-
Size
771KB
-
MD5
65d696b361551816241d8e2ba9b4e536
-
SHA1
17948438133600f4dc03c5d73e914150d9c8e4e7
-
SHA256
bb70841b4666dfa83dcf2995a57676fadfba76a12795e4cfd62e65a704641035
-
SHA512
d88171d4c596c7fec2dae3088d2b81abb7c1c56f9ad8c4e31e71fd3900419b8d3154af9af85e12389c0280d78f96ef17dd2c0ba7b8a702db3437a4e0c889c811
-
SSDEEP
12288:dQl4ftI6j59c+f9/wfAceNYdDKcPzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:dQl4ft319cASfnG2tvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 65d696b361551816241d8e2ba9b4e536.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 65d696b361551816241d8e2ba9b4e536.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 956 65d696b361551816241d8e2ba9b4e536.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 956 65d696b361551816241d8e2ba9b4e536.exe 2100 65d696b361551816241d8e2ba9b4e536.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 2100 956 65d696b361551816241d8e2ba9b4e536.exe 88 PID 956 wrote to memory of 2100 956 65d696b361551816241d8e2ba9b4e536.exe 88 PID 956 wrote to memory of 2100 956 65d696b361551816241d8e2ba9b4e536.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d696b361551816241d8e2ba9b4e536.exe"C:\Users\Admin\AppData\Local\Temp\65d696b361551816241d8e2ba9b4e536.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\65d696b361551816241d8e2ba9b4e536.exeC:\Users\Admin\AppData\Local\Temp\65d696b361551816241d8e2ba9b4e536.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5e498d6776c5f7e3da17c92abd1095164
SHA10d066a573420123f998dceefe2a33eb683aa4b26
SHA256cfb08b12bfb7c1e8517bf20c234f9d49e6d327234fc54fb85cec98d66fdc21fc
SHA51241b453cd593e71b5a577b696a8a305332ae7a7202f6e8776d1efa934a702380b591dd4a28861890aa8735c0a64e955c7591e40869d8dec5a21365c38d356e074