Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
73109c8d60456cc09785b55cf4a26f3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73109c8d60456cc09785b55cf4a26f3f.exe
Resource
win10v2004-20231215-en
General
-
Target
73109c8d60456cc09785b55cf4a26f3f.exe
-
Size
907KB
-
MD5
73109c8d60456cc09785b55cf4a26f3f
-
SHA1
962220c531058bb50398a449a39df755af15e5b4
-
SHA256
333a23ef0be1af47f9fac74ea6dc8a3d32547b48976f43e2348b237945eefa08
-
SHA512
08f913a58ece452718e73fc3d1189333d55039f2431fcc7ad9f55b5f6d05fb90697cf3908cd01096c71eab8aecbd15f9f326143c1e1ce1c3c374cb7c9a7fbf67
-
SSDEEP
24576:fRujIGQ0JGVk+ZmU38GKN0jmQLN+6iujKT6lPJa/ZS1:5ujJQY+ZmbV0CQB+RuOT6lRgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 73109c8d60456cc09785b55cf4a26f3f.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 73109c8d60456cc09785b55cf4a26f3f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 536 73109c8d60456cc09785b55cf4a26f3f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 536 73109c8d60456cc09785b55cf4a26f3f.exe 2168 73109c8d60456cc09785b55cf4a26f3f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 2168 536 73109c8d60456cc09785b55cf4a26f3f.exe 90 PID 536 wrote to memory of 2168 536 73109c8d60456cc09785b55cf4a26f3f.exe 90 PID 536 wrote to memory of 2168 536 73109c8d60456cc09785b55cf4a26f3f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\73109c8d60456cc09785b55cf4a26f3f.exe"C:\Users\Admin\AppData\Local\Temp\73109c8d60456cc09785b55cf4a26f3f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\73109c8d60456cc09785b55cf4a26f3f.exeC:\Users\Admin\AppData\Local\Temp\73109c8d60456cc09785b55cf4a26f3f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD555554b1aec25b9630a4f1289656a1ef6
SHA1c8277fdff0308b5718d0a5c235e9e058e5974a7b
SHA256265f9eea627709e548469764d5dfe873ffd3bad12ab9aba1cced1add6635d011
SHA5123c5a88d7fdec4dcd20886177b60f4eef26956213d02f8491eb203bdf5fe8a14cc9de6a73483687cab72261e9c1c750ebfbf73a5d9da59b8fd29c981be42afaa2