Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
724b6555d5aa2e31279ed3f4f46777bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
724b6555d5aa2e31279ed3f4f46777bb.exe
Resource
win10v2004-20231215-en
General
-
Target
724b6555d5aa2e31279ed3f4f46777bb.exe
-
Size
385KB
-
MD5
724b6555d5aa2e31279ed3f4f46777bb
-
SHA1
fb2bd0dd1110cc7b01f76b277a2639014c6a2691
-
SHA256
a536fdb959c380a876679c309d86ea03ddb2e115c33cac8e6d2e730d53144d73
-
SHA512
c815dda7348bdbfa849097ea44f3b11614d13eaf6aec456e6322257a79c64ecf3360de131bc59872c63896b52ee55b5351ff40cae42c8f3b611fa0c56d4e683f
-
SSDEEP
12288:SDIFqDctZpJWb+Da2QJqrdW85OZDpls6DqB:lWbKa2gqxWGYbGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4980 724b6555d5aa2e31279ed3f4f46777bb.exe -
Executes dropped EXE 1 IoCs
pid Process 4980 724b6555d5aa2e31279ed3f4f46777bb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4900 724b6555d5aa2e31279ed3f4f46777bb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4900 724b6555d5aa2e31279ed3f4f46777bb.exe 4980 724b6555d5aa2e31279ed3f4f46777bb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4980 4900 724b6555d5aa2e31279ed3f4f46777bb.exe 86 PID 4900 wrote to memory of 4980 4900 724b6555d5aa2e31279ed3f4f46777bb.exe 86 PID 4900 wrote to memory of 4980 4900 724b6555d5aa2e31279ed3f4f46777bb.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\724b6555d5aa2e31279ed3f4f46777bb.exe"C:\Users\Admin\AppData\Local\Temp\724b6555d5aa2e31279ed3f4f46777bb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\724b6555d5aa2e31279ed3f4f46777bb.exeC:\Users\Admin\AppData\Local\Temp\724b6555d5aa2e31279ed3f4f46777bb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD57d2edec4ac2c6e9436fc17294a638340
SHA1ff452c3f3e4227efbda637b74ba194a67aac1ae9
SHA2564bbf0c56da4a722a1845332ed8a965525c7792566cdf9a4ab785665a2bfb77f3
SHA51213c9c13267d4e944aba33dcdcb792d74e3903eedd206203418d04e0bbab982c81ccda2243ae150fa4f371aa9ee442df62dc2945e0bb081f040d4e9d3c68b14c2