Analysis

  • max time kernel
    90s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 16:21

General

  • Target

    77d282c1878dd7fc7e9fbdc51323e953.exe

  • Size

    907KB

  • MD5

    77d282c1878dd7fc7e9fbdc51323e953

  • SHA1

    8a460d4039a0dd7a608da07dbea90c0cdcb823b0

  • SHA256

    d7a85bc48c751b2e10f593308de08c14cc3590387cfff808b4abbba2b5dfdcff

  • SHA512

    94bc8122ecd0bd5895e8a87973475c4e0b0a4cc7f5d52de4876188bfe47a1a7f9111d8fbee25e284543fe9aafcc3196501503a9583cf639f8e2025377dc9e8d1

  • SSDEEP

    24576:RaQ30kWoU00iJBbDJnNjh6c1M+6Oa/ZS1:pEkfHxJBbDdqOgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe
    "C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe
      C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe

          Filesize

          399KB

          MD5

          309768241a0e8af460d0e0b23483d39c

          SHA1

          fdd710de36acc30e32147ddc571ab34220f8a5a7

          SHA256

          f469bd32963521d7bd6a54825cce5c7a9fb0c5fbfdaecd7712835d145abb3aad

          SHA512

          ebd8671ced0e971fcbe6f3340d984dbe69e29ccaad8203e9eb10ae3dce6684a038af33f840cdcc8236d383d613b46da46f710f81e90147c56e4adfc995b4c4a5

        • memory/1060-13-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/1060-19-0x00000000016D0000-0x00000000017B8000-memory.dmp

          Filesize

          928KB

        • memory/1060-20-0x0000000000400000-0x0000000000498000-memory.dmp

          Filesize

          608KB

        • memory/1060-23-0x00000000050C0000-0x000000000517B000-memory.dmp

          Filesize

          748KB

        • memory/1060-36-0x000000000C840000-0x000000000C8D8000-memory.dmp

          Filesize

          608KB

        • memory/1060-30-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1320-0-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/1320-1-0x0000000001650000-0x0000000001738000-memory.dmp

          Filesize

          928KB

        • memory/1320-2-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB

        • memory/1320-11-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB