Analysis
-
max time kernel
87s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
74c53396d163878d935597e9426ae79a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74c53396d163878d935597e9426ae79a.exe
Resource
win10v2004-20231215-en
General
-
Target
74c53396d163878d935597e9426ae79a.exe
-
Size
385KB
-
MD5
74c53396d163878d935597e9426ae79a
-
SHA1
f0beebae970f3dc76b30cab9affb7efc1ab24cb4
-
SHA256
80fc2daefbf699eb8389465b1901257f5bb52563514b2b7e53f61d0debb138c1
-
SHA512
41b85e91ca4f62e932172ea68230c4db523460cb8b82e941b4b8a47cba7c2b3265b8bd5571a896e0bbc3a4084ac08ac24227370bf6ccef41b9daeffe3a0ae0ad
-
SSDEEP
6144:2fIWDv/sfP8cmqZ+q+hoON0chpgMEE/P8jYbhPQgVZPLvB:2fIOv/sfP8e+NzPFXdbhPHVZjvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4640 74c53396d163878d935597e9426ae79a.exe -
Executes dropped EXE 1 IoCs
pid Process 4640 74c53396d163878d935597e9426ae79a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1320 74c53396d163878d935597e9426ae79a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1320 74c53396d163878d935597e9426ae79a.exe 4640 74c53396d163878d935597e9426ae79a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4640 1320 74c53396d163878d935597e9426ae79a.exe 86 PID 1320 wrote to memory of 4640 1320 74c53396d163878d935597e9426ae79a.exe 86 PID 1320 wrote to memory of 4640 1320 74c53396d163878d935597e9426ae79a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\74c53396d163878d935597e9426ae79a.exe"C:\Users\Admin\AppData\Local\Temp\74c53396d163878d935597e9426ae79a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\74c53396d163878d935597e9426ae79a.exeC:\Users\Admin\AppData\Local\Temp\74c53396d163878d935597e9426ae79a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58939e7b7bb0652ae89d4da2da38ecb6e
SHA11971365cd38e3c8e856b666083a57293f2f0e820
SHA256465112fa5e3a09257e9a9c73c135d7863b6d8354482bc54ee17b3dba04475e47
SHA51244b5667a29700f416192a9d83298b5877ab0a09b4eb283ee15b34d91e261b521d8b76228ad2f53120c8137ef044d180391aa2b9c67d9790d87f60704492b44cb