Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
65d11b5296ef9b6ff32a90ec52e45670.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65d11b5296ef9b6ff32a90ec52e45670.exe
Resource
win10v2004-20231222-en
General
-
Target
65d11b5296ef9b6ff32a90ec52e45670.exe
-
Size
771KB
-
MD5
65d11b5296ef9b6ff32a90ec52e45670
-
SHA1
3aa00b822f041e94e17cc9fa6fac0ecfd6ceeaa9
-
SHA256
6f49bcf4bd59f6a519d638c2655dc5c0da12d3a35d64a05515695db12c277fe6
-
SHA512
d4133d52a0640877f1fa531f62ef25cb1bfc208512d4fd177bebc9ab7a2d66988517268184a56f88c8a985cc6b3258585608c91bedfb29119d211990c34e50a9
-
SSDEEP
24576:G2co+oPSiG5AoxlJb10hJaothZ2/T6FBBB:GPOXoF/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4296 65d11b5296ef9b6ff32a90ec52e45670.exe -
Executes dropped EXE 1 IoCs
pid Process 4296 65d11b5296ef9b6ff32a90ec52e45670.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1424 65d11b5296ef9b6ff32a90ec52e45670.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4532 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1424 65d11b5296ef9b6ff32a90ec52e45670.exe 4296 65d11b5296ef9b6ff32a90ec52e45670.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 4296 1424 65d11b5296ef9b6ff32a90ec52e45670.exe 88 PID 1424 wrote to memory of 4296 1424 65d11b5296ef9b6ff32a90ec52e45670.exe 88 PID 1424 wrote to memory of 4296 1424 65d11b5296ef9b6ff32a90ec52e45670.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d11b5296ef9b6ff32a90ec52e45670.exe"C:\Users\Admin\AppData\Local\Temp\65d11b5296ef9b6ff32a90ec52e45670.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\65d11b5296ef9b6ff32a90ec52e45670.exeC:\Users\Admin\AppData\Local\Temp\65d11b5296ef9b6ff32a90ec52e45670.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4296
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD5bba4f5cb1b97db2213d2df6466b569a9
SHA1febd585012376847712903990e0efc11ad8de3dd
SHA25656ef01842d34ab3cce116f93fa4bd6daf10d3ebfe1e3bbd5dfa43f1ccd068b1e
SHA51216d2a6db335b4b9f5bf54844db8299dcd9808b42729a6ca1742bf99459f9ad6ab436142a767bb4654444f4c62e3c07b383334d4f7715d92607f74e632746d8fd