Analysis
-
max time kernel
90s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
65d3b06caf6ebfc282344e9d7e4ee80c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65d3b06caf6ebfc282344e9d7e4ee80c.exe
Resource
win10v2004-20231215-en
General
-
Target
65d3b06caf6ebfc282344e9d7e4ee80c.exe
-
Size
385KB
-
MD5
65d3b06caf6ebfc282344e9d7e4ee80c
-
SHA1
f117f7226f54391d009e8d634f662ae4aa052e03
-
SHA256
4fa28a8c352a504fe7aff6e5850a15e4d1afad042185416a7ba39856a4de2b84
-
SHA512
751090a62ec0eb66660211c29dd03d980c0ea8d77d55663faac21c9e61b5873f773ce94dd302ee0409e8126f115fa12c3f0cce1467ebec0db99a9d0e90066e9c
-
SSDEEP
6144:G7rfojVa3bwQKbe2t9dC/X64lrNs9LsTT46q8K4Rt9QdSvOzexxB0mNs01CU4qc4:GHeI30Qs5+64lrNsP50Qi9Ns/HImWfB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 65d3b06caf6ebfc282344e9d7e4ee80c.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 65d3b06caf6ebfc282344e9d7e4ee80c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 228 65d3b06caf6ebfc282344e9d7e4ee80c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 228 65d3b06caf6ebfc282344e9d7e4ee80c.exe 2372 65d3b06caf6ebfc282344e9d7e4ee80c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 2372 228 65d3b06caf6ebfc282344e9d7e4ee80c.exe 87 PID 228 wrote to memory of 2372 228 65d3b06caf6ebfc282344e9d7e4ee80c.exe 87 PID 228 wrote to memory of 2372 228 65d3b06caf6ebfc282344e9d7e4ee80c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d3b06caf6ebfc282344e9d7e4ee80c.exe"C:\Users\Admin\AppData\Local\Temp\65d3b06caf6ebfc282344e9d7e4ee80c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\65d3b06caf6ebfc282344e9d7e4ee80c.exeC:\Users\Admin\AppData\Local\Temp\65d3b06caf6ebfc282344e9d7e4ee80c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5344670933d6ce691f28543f062d6d544
SHA1773002cb472d9275ad6197b2cc52104b12bf0cb8
SHA256e2773dcdba5ab06ade7ba4816be9914b658602d9cae1c52eae87da1128aa5310
SHA5123db7fd538e8afa687480d620747237a4031231666f96e7d11798b708b5dce29a6f320aed9941675700e3713ba76a66154c91a319f14cdf1e424bcffb706a06d5