Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
667635562c8f41687b12b34430a9d10d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
667635562c8f41687b12b34430a9d10d.exe
Resource
win10v2004-20231215-en
General
-
Target
667635562c8f41687b12b34430a9d10d.exe
-
Size
771KB
-
MD5
667635562c8f41687b12b34430a9d10d
-
SHA1
c42cfe4458b4b4a28a114b1fb3f6869bf7ba4330
-
SHA256
20b4cb5651e55daf56bc4e4a529fbb7e68783ca3221589e10d20c3ac2050da48
-
SHA512
31143d1034ac4e2a80b6a33022c27132557df7b934a3a5671d6dcbadce454c42b9d00e1bbb7552e1e6d3bda2eb4408bddcdc9339444ebccdb044cd1cc7874859
-
SSDEEP
12288:YuS3800PxIrZxsT2tejsCbomm+zSe+msb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRY:LJII6tejsCH2b10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4828 667635562c8f41687b12b34430a9d10d.exe -
Executes dropped EXE 1 IoCs
pid Process 4828 667635562c8f41687b12b34430a9d10d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1000 667635562c8f41687b12b34430a9d10d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1000 667635562c8f41687b12b34430a9d10d.exe 4828 667635562c8f41687b12b34430a9d10d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1000 wrote to memory of 4828 1000 667635562c8f41687b12b34430a9d10d.exe 87 PID 1000 wrote to memory of 4828 1000 667635562c8f41687b12b34430a9d10d.exe 87 PID 1000 wrote to memory of 4828 1000 667635562c8f41687b12b34430a9d10d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\667635562c8f41687b12b34430a9d10d.exe"C:\Users\Admin\AppData\Local\Temp\667635562c8f41687b12b34430a9d10d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\667635562c8f41687b12b34430a9d10d.exeC:\Users\Admin\AppData\Local\Temp\667635562c8f41687b12b34430a9d10d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5ef0d53f5d870e6aa8315a03d427fdb86
SHA12a6fefa03148c6d1d5d40edfa3bd06157e615a81
SHA256dcffc136d36ed689049594efe26b40def2ae392677603c9f4830b4f6686f97fd
SHA512d175bd87a0ac881a29ee8f905de57aea25f54fcd55ab74229de1e7868862161c1bed3d8b33eba7b613b214b066c4a3c4456b49458be79752c7c6055045a6554d