Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
711068ae5803bdbeed4eef9b00ab0d2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
711068ae5803bdbeed4eef9b00ab0d2a.exe
Resource
win10v2004-20231215-en
General
-
Target
711068ae5803bdbeed4eef9b00ab0d2a.exe
-
Size
771KB
-
MD5
711068ae5803bdbeed4eef9b00ab0d2a
-
SHA1
aeba14f5577b18766515a6693d2274e8fdf667ac
-
SHA256
8be353641c207af1bc7fc9a3b6046c3e727a012052e82122d3a14e6782c123e4
-
SHA512
a6dfdcda7c6d0fa4c12c59115a34e7f6a2e184cf2f5a8a41e1c1a720a7029fb7f44b89a4243ebf67c72c052b14da752022550c72561f475080e7a05bb952d69e
-
SSDEEP
24576:oiJFU6DDG2tbxKBbXb10hJaothZ2/T6FBBB:DJF/qYKBbL/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1032 711068ae5803bdbeed4eef9b00ab0d2a.exe -
Executes dropped EXE 1 IoCs
pid Process 1032 711068ae5803bdbeed4eef9b00ab0d2a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1980 711068ae5803bdbeed4eef9b00ab0d2a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1980 711068ae5803bdbeed4eef9b00ab0d2a.exe 1032 711068ae5803bdbeed4eef9b00ab0d2a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1032 1980 711068ae5803bdbeed4eef9b00ab0d2a.exe 88 PID 1980 wrote to memory of 1032 1980 711068ae5803bdbeed4eef9b00ab0d2a.exe 88 PID 1980 wrote to memory of 1032 1980 711068ae5803bdbeed4eef9b00ab0d2a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\711068ae5803bdbeed4eef9b00ab0d2a.exe"C:\Users\Admin\AppData\Local\Temp\711068ae5803bdbeed4eef9b00ab0d2a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\711068ae5803bdbeed4eef9b00ab0d2a.exeC:\Users\Admin\AppData\Local\Temp\711068ae5803bdbeed4eef9b00ab0d2a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD56358f7f5b1e0fa24178bbe1ddfeaf3af
SHA10d4e18ae663c2522edf5cef81936ac2ca8da5747
SHA2568da8ad5650cdb7f59a1cce0bfceb373a5e69c0f2fae0eb050870a09821a98db4
SHA51275b7f6a4032865756e5808612cd67a55bf2c18db2015a4bdadaf0d851a1ee8eee3b9598a12e2664b73cd8fc875d12b075efa0019900d22da25b905a18a54e39d