Analysis

  • max time kernel
    81s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 17:41

General

  • Target

    751eceda74a757f0200a674b46523b38.exe

  • Size

    771KB

  • MD5

    751eceda74a757f0200a674b46523b38

  • SHA1

    e7ba3c674080b16f4d6afd419ffe6720f74c8864

  • SHA256

    2a23c37c542faaba1f61f2fa52eeef28ea91ab91ea97ea5f2875ec86a9b0f0d2

  • SHA512

    f9b3e0ea691d3cb832a13ed2194f35510fa41f109b51bfcdacc33def857929fd4bcc979580dba0497ff9776d6643924dc0786478e5f9c5965e1ab3bc31d8f4f7

  • SSDEEP

    24576:rpLS7SNYafVlZjFlb10hJaothZ2/T6FBBB:rAu/jp/ofT

Score
10/10

Malware Config

Signatures

  • Kinsing

    Kinsing is a loader written in Golang.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe
    "C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe
      C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe

    Filesize

    771KB

    MD5

    b327be4ede35f2c4ba22a9f0e91e835f

    SHA1

    3101dc4ccaff7851b2c0d8ee59abf5483465ab5b

    SHA256

    c6c71f195d1b5f44906ba2054f547c4ad9a9c46941d13a586b272d74b8f8a9da

    SHA512

    60a89ae745f6135ea2ce5b98ad1b7f5814f2fafd3daf27c8f1025599079435c10cf1ca1d0e1decd1a777f8e600beffb7d0895bf1a959e4ba73a6beb1b7bf3a76

  • memory/2544-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2544-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/2544-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2544-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4588-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4588-14-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/4588-20-0x0000000004E80000-0x0000000004EDF000-memory.dmp

    Filesize

    380KB

  • memory/4588-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4588-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4588-35-0x000000000D660000-0x000000000D69C000-memory.dmp

    Filesize

    240KB

  • memory/4588-38-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB