Analysis

  • max time kernel
    137s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 19:15

General

  • Target

    754c5b0d3d601a36306bbd125261c235.exe

  • Size

    907KB

  • MD5

    754c5b0d3d601a36306bbd125261c235

  • SHA1

    a020bb7974a2497827c7fc07df4905441609c731

  • SHA256

    eb0639bda709c2907d16a82cd9159086da83da02511ac726ae225d75d3aef963

  • SHA512

    b8fe3c8fc46fa33d65a750aba17913fe07e76bddec286cd9edf95cd9de6916b27a4f5c87028d435489c33dddf2afd9d34391fe2325ac17452835c8a4f67ef2ef

  • SSDEEP

    24576:uZax6RkHsYeYS9Pkz1vhvuZTdMcfa/ZS1:lx/HsYex9Pkz1v4ZTdMYgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe
    "C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe
      C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe

    Filesize

    907KB

    MD5

    a1ba1de14e18de779524f1f8eb376da6

    SHA1

    ae64367da230435017987797c028ea3a1ef53aa7

    SHA256

    1e32b82ef691299751cff3b5a30ec46a8f4a4c2ae642c6a9b51b5cc57079022a

    SHA512

    23ca7636c2c38ab588bc66d390b9fa7f55ab23ace1a2de78127d70769d87a90942aedcb01680ff81cfb6cc4cbb7369f49965183b7ce38bcfd178dcc8403c3147

  • memory/216-13-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/216-15-0x00000000017D0000-0x00000000018B8000-memory.dmp

    Filesize

    928KB

  • memory/216-20-0x0000000005130000-0x00000000051EB000-memory.dmp

    Filesize

    748KB

  • memory/216-21-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/216-32-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/216-36-0x000000000C820000-0x000000000C8B8000-memory.dmp

    Filesize

    608KB

  • memory/4376-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4376-1-0x0000000001840000-0x0000000001928000-memory.dmp

    Filesize

    928KB

  • memory/4376-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/4376-12-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB