Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
6851702a3e20c3c5d7833048f6f29ba9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6851702a3e20c3c5d7833048f6f29ba9.exe
Resource
win10v2004-20231215-en
General
-
Target
6851702a3e20c3c5d7833048f6f29ba9.exe
-
Size
907KB
-
MD5
6851702a3e20c3c5d7833048f6f29ba9
-
SHA1
34014011c77f489727f636f3d969344f6ccb108d
-
SHA256
797d724475713a22223cedcfd8314655924e063fe2e16f17d0bb31782e815c13
-
SHA512
3f0261a4a717c33164c5da8e28db691ff498f392b674b5f37277425c140f03cd76753385cb57ba4bb9a264d3de974d265eec4e0e2567ed2f3044edced807b716
-
SSDEEP
24576:2kuvVvFOMnTohtwcnCQlIIrZtdGAa/ZS1:PutAy4twcpjHPgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4896 6851702a3e20c3c5d7833048f6f29ba9.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 6851702a3e20c3c5d7833048f6f29ba9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1276 6851702a3e20c3c5d7833048f6f29ba9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1276 6851702a3e20c3c5d7833048f6f29ba9.exe 4896 6851702a3e20c3c5d7833048f6f29ba9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1276 wrote to memory of 4896 1276 6851702a3e20c3c5d7833048f6f29ba9.exe 88 PID 1276 wrote to memory of 4896 1276 6851702a3e20c3c5d7833048f6f29ba9.exe 88 PID 1276 wrote to memory of 4896 1276 6851702a3e20c3c5d7833048f6f29ba9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6851702a3e20c3c5d7833048f6f29ba9.exe"C:\Users\Admin\AppData\Local\Temp\6851702a3e20c3c5d7833048f6f29ba9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\6851702a3e20c3c5d7833048f6f29ba9.exeC:\Users\Admin\AppData\Local\Temp\6851702a3e20c3c5d7833048f6f29ba9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5b510a1c40154d03e18cff133937d49dd
SHA1cecfb77dce5e261ee9d73579e3dfc3c580407eaa
SHA256f8471c871cb6689ef1f134b745ee36c822935c2954cd594e5511707a9fa9ecfb
SHA512fb50c6b50d722dbff1bd0b5d58f7d4b969a43132da0deb0998607559bf7b6b79ba54e2e1eb63003a09fcdf703f14b4973e9b0a77cfe0d173a1c4863b68032239