Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
73c9ae0f53fc7dd4e9943f213f494a2b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73c9ae0f53fc7dd4e9943f213f494a2b.exe
Resource
win10v2004-20231215-en
General
-
Target
73c9ae0f53fc7dd4e9943f213f494a2b.exe
-
Size
771KB
-
MD5
73c9ae0f53fc7dd4e9943f213f494a2b
-
SHA1
80f7e42cce52ca574c4a57080c4a0ee8738f41b7
-
SHA256
d4a8ad165d63cdda98ffc0f60db7f484e9a86fb5a00a0c1dee3867425a08196e
-
SHA512
f1477998219caf654f9390c8a096f9b0dbcaab3241c0a5fb7602f4c91f9d22c55f90c5bac09abb5a0bd023c53c32ef51a2c2bdab70fd5febe4f07100251dafac
-
SSDEEP
24576:6TxUBDrcNO4n0Csb10hJaothZ2/T6FBBB:gx2AN3E/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3704 73c9ae0f53fc7dd4e9943f213f494a2b.exe -
Executes dropped EXE 1 IoCs
pid Process 3704 73c9ae0f53fc7dd4e9943f213f494a2b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1912 73c9ae0f53fc7dd4e9943f213f494a2b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1912 73c9ae0f53fc7dd4e9943f213f494a2b.exe 3704 73c9ae0f53fc7dd4e9943f213f494a2b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3704 1912 73c9ae0f53fc7dd4e9943f213f494a2b.exe 87 PID 1912 wrote to memory of 3704 1912 73c9ae0f53fc7dd4e9943f213f494a2b.exe 87 PID 1912 wrote to memory of 3704 1912 73c9ae0f53fc7dd4e9943f213f494a2b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c9ae0f53fc7dd4e9943f213f494a2b.exe"C:\Users\Admin\AppData\Local\Temp\73c9ae0f53fc7dd4e9943f213f494a2b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\73c9ae0f53fc7dd4e9943f213f494a2b.exeC:\Users\Admin\AppData\Local\Temp\73c9ae0f53fc7dd4e9943f213f494a2b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5f0dd27b01289a064ad2d45d629a941f7
SHA12c1ebd651280fe97ebbf8b8f6063b0c8c0d36169
SHA256a71df28aac8aaa311c5fdfb9446a58f44ab602f0fcab15ac2c0b1f6bc7a01a1b
SHA512687843fafba3ecde51b1fa01aed3739255fc35cd4b415745736d41f32d6eb90c486fa742c7851b032c253eef9b3f6de2accc0299df50ce62a26527053d215106