Analysis
-
max time kernel
134s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
6663f58ab882da7cee36b7191fc68c73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6663f58ab882da7cee36b7191fc68c73.exe
Resource
win10v2004-20231215-en
General
-
Target
6663f58ab882da7cee36b7191fc68c73.exe
-
Size
385KB
-
MD5
6663f58ab882da7cee36b7191fc68c73
-
SHA1
34b2dea8ec5a0c05ad1968ba26a46e2c967b90d3
-
SHA256
4468f6c8f8ae74d4a1003ac763ec6b0be96dccdaa511e5d7eecfa72161a2b374
-
SHA512
3a3b5f59fa4868368547c88b79e828ac70bebb8b84e6bc5947b407df958e78017ca99e40cafccf2f4152fddf07146c23efaf5e013a8ca93f042c141cbc7f1c7a
-
SSDEEP
12288:NcAJZDZfVcPxJspYPmF/FzlcnJxQz2rD5YWfQv+i9veB:NcGZVcnm9gnPQyr9YWfK9GB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 6663f58ab882da7cee36b7191fc68c73.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 6663f58ab882da7cee36b7191fc68c73.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 6663f58ab882da7cee36b7191fc68c73.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 6663f58ab882da7cee36b7191fc68c73.exe 2240 6663f58ab882da7cee36b7191fc68c73.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2240 1844 6663f58ab882da7cee36b7191fc68c73.exe 88 PID 1844 wrote to memory of 2240 1844 6663f58ab882da7cee36b7191fc68c73.exe 88 PID 1844 wrote to memory of 2240 1844 6663f58ab882da7cee36b7191fc68c73.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6663f58ab882da7cee36b7191fc68c73.exe"C:\Users\Admin\AppData\Local\Temp\6663f58ab882da7cee36b7191fc68c73.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\6663f58ab882da7cee36b7191fc68c73.exeC:\Users\Admin\AppData\Local\Temp\6663f58ab882da7cee36b7191fc68c73.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5154eaea574d191fbd4f7d4e4b4f1cbed
SHA109b1c48ae696da0ef7d24011b45b7d1772527839
SHA256cfdac6eb58c1243ba8c33c272ba468ef859471d75de10e323b4f78a96e9a825f
SHA512d8f44992712721a9fa3c8f1b7a8768b633503a144536f63a5391a0090a980b304a7c2b5ecc44ac4033b7879242866fd2b7b8beecdbedeba791667a29ed968c49