Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 12:53

General

  • Target

    7a4e6770394198683b0aad7c11f616bb.exe

  • Size

    385KB

  • MD5

    7a4e6770394198683b0aad7c11f616bb

  • SHA1

    82fd8f08cf371c92da8719846b957b7aee861dfe

  • SHA256

    e28f0b6ec14f2ccd426d58b60f39623a61e0fdb0c660b218156b388033c4b0d3

  • SHA512

    bed67757daa036ad98ab79bd461294643fe59e1820baf55f759b5dd2aadf1ee1f16733c49b57bd26e26e08df446539bd15837b6b453425e16c71aaddc09cf895

  • SSDEEP

    6144:B8VTyJsN0b9hzvpGX5ZaF19FttGvJjudX8BvphDmvm8vBKlGYivDIIB:2V0sNyvMZa6v5gcx3xDGB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe
    "C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe
      C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe

    Filesize

    385KB

    MD5

    4ba7993902b94263ff70adbf7a42e5a0

    SHA1

    9eca9fcdbefa3694e4b24b67a19094c3cf61ffb2

    SHA256

    130d67bb5de0782b1d3e8bf2f875fc73048e5efe10e0850611882d9eba651b43

    SHA512

    55adcc8c15e648bffd59e134e8fbadfc4394145bde97c66a6ae02deea660008e49464c50b90277369e7462c178de0faa409982a77f05813ab1735d0c136d6d95

  • memory/4972-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4972-16-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4972-20-0x0000000001620000-0x000000000167F000-memory.dmp

    Filesize

    380KB

  • memory/4972-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4972-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4972-35-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/4972-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/5036-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/5036-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/5036-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/5036-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB