Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
684ece7cda1c2f73070debb81b49d9de.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
684ece7cda1c2f73070debb81b49d9de.exe
Resource
win10v2004-20231215-en
General
-
Target
684ece7cda1c2f73070debb81b49d9de.exe
-
Size
385KB
-
MD5
684ece7cda1c2f73070debb81b49d9de
-
SHA1
3e5666c957670a32234585c4f8345b06ed79ec77
-
SHA256
31e492ecee464806260e56bc3f5cf8ffb1e0c94e554bb0307f80c5a8bab5882e
-
SHA512
25bb333c33fd0cf59389b0e255fc4a5a8d79e362840e2a7cf4b832ab5dadc77a2d6b2d0fc06b99aeb47e1fe570868156bcc0a793e0b77a6834cad59191856944
-
SSDEEP
6144:cmC7GN+Ws5eclzJeU1jNbrf7rPFXwhDfcunCGvZoDFztx3GX9jGB:cmkGI5tnbrPPFcp8DhtNo9aB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4720 684ece7cda1c2f73070debb81b49d9de.exe -
Executes dropped EXE 1 IoCs
pid Process 4720 684ece7cda1c2f73070debb81b49d9de.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4144 684ece7cda1c2f73070debb81b49d9de.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4144 684ece7cda1c2f73070debb81b49d9de.exe 4720 684ece7cda1c2f73070debb81b49d9de.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4720 4144 684ece7cda1c2f73070debb81b49d9de.exe 87 PID 4144 wrote to memory of 4720 4144 684ece7cda1c2f73070debb81b49d9de.exe 87 PID 4144 wrote to memory of 4720 4144 684ece7cda1c2f73070debb81b49d9de.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\684ece7cda1c2f73070debb81b49d9de.exe"C:\Users\Admin\AppData\Local\Temp\684ece7cda1c2f73070debb81b49d9de.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\684ece7cda1c2f73070debb81b49d9de.exeC:\Users\Admin\AppData\Local\Temp\684ece7cda1c2f73070debb81b49d9de.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5180e527b617178862bb5af9a7ccdb2a3
SHA1a67c44b14f2c722fab31c5c19c37b6b5bea3c65c
SHA256550652a350791c62c736cf82fbd6373a8afa6ba807f1a175af43263af810b282
SHA512a8ec392cd45b3328bedbd559c1cf5c323cd66d1fb73b0a84d780e5bbffdb79d35a47b9607dd0fd41889f84062a850f0a219cb12bf3845c724a3a35df7c04fb30