Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
72f5d3f5275f2ce6668934c387a0f7c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72f5d3f5275f2ce6668934c387a0f7c5.exe
Resource
win10v2004-20231215-en
General
-
Target
72f5d3f5275f2ce6668934c387a0f7c5.exe
-
Size
385KB
-
MD5
72f5d3f5275f2ce6668934c387a0f7c5
-
SHA1
090688a6983851d03c8acd11f0ab71eb511ecc4c
-
SHA256
58612093b919f0537a69912c4d70e519d3a798d2047a2d262295f50c7fa332a4
-
SHA512
2ce0ecc3ce14f32dedea38cb7aad61c64528e9bee07fa45234ab116036865a796c70ea941a71ad232b626daa321b61734de14fb33f582cd34999617708588094
-
SSDEEP
12288:2Rlo0SmioKflnh+iuaoO9fq/ipKpACa3/KB:2bEoil3oQoouACaSB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1000 72f5d3f5275f2ce6668934c387a0f7c5.exe -
Executes dropped EXE 1 IoCs
pid Process 1000 72f5d3f5275f2ce6668934c387a0f7c5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 72f5d3f5275f2ce6668934c387a0f7c5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 72f5d3f5275f2ce6668934c387a0f7c5.exe 1000 72f5d3f5275f2ce6668934c387a0f7c5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1000 1984 72f5d3f5275f2ce6668934c387a0f7c5.exe 86 PID 1984 wrote to memory of 1000 1984 72f5d3f5275f2ce6668934c387a0f7c5.exe 86 PID 1984 wrote to memory of 1000 1984 72f5d3f5275f2ce6668934c387a0f7c5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\72f5d3f5275f2ce6668934c387a0f7c5.exe"C:\Users\Admin\AppData\Local\Temp\72f5d3f5275f2ce6668934c387a0f7c5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\72f5d3f5275f2ce6668934c387a0f7c5.exeC:\Users\Admin\AppData\Local\Temp\72f5d3f5275f2ce6668934c387a0f7c5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5a3800912da1df6b49d81d02521153add
SHA1cff597bebe1a4f67cf83cba146102b0c2cdb0d0b
SHA25626e57066d79abef6db1166f8ef593c67f3a8d7a4412b3cf4e71e49cfe1778799
SHA512b51fc216de0a408437b4718476cc18ee3f4e9b25062fec3abddcd35c41e864f0069a91f0d8e2f7d701dbf510a219cfe7bdddc65babd7f640bf586623e961fbd6