Analysis

  • max time kernel
    88s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 04:36

General

  • Target

    8892bba0a849c3df57377fcfa4e2e896.exe

  • Size

    385KB

  • MD5

    8892bba0a849c3df57377fcfa4e2e896

  • SHA1

    a45c5b9a6854677d087dcb10dfb4832d240ffa48

  • SHA256

    3b105d70136969d53890084070c7b685e2d528b75a34911531d6be4e07e8204a

  • SHA512

    ba27a1c009c5a899b558f097c69a25b1cbaafde168b505ec44e73952efc8d3434c9bea0b4848cf12b6508e41037ac54b2c54cb861a8d547994b14785d9123563

  • SSDEEP

    6144:/lPO7D1zItbLN7KVYVdAwI1FmnPaRkuFD8GU6O9REUgiyS92h8BFTdV9gzguupju:/cQ9lzAduniRku18H6s99f9V9g1upjUB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe
    "C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe
      C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe

    Filesize

    385KB

    MD5

    95275ee05c713a439b4ee646b86f1ea3

    SHA1

    62776c0eafe6726c6d210a751a171ef376e764b9

    SHA256

    5413aeb0d97097d98fcb1494115d53fc7142889c96aa24bc0c28923ec88bf5d8

    SHA512

    557469478865932c965ccbdb88f447bcca699558ccf184a993498eb3946e7479a45436e2cdf49d808a34ebb43ed40db834692bf2c6fe28283ab9491f0d5e488c

  • memory/4176-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4176-20-0x0000000004ED0000-0x0000000004F2F000-memory.dmp

    Filesize

    380KB

  • memory/4176-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4176-15-0x0000000001650000-0x00000000016B6000-memory.dmp

    Filesize

    408KB

  • memory/4176-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4176-38-0x000000000B620000-0x000000000B65C000-memory.dmp

    Filesize

    240KB

  • memory/4176-37-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4968-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4968-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4968-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4968-1-0x00000000015F0000-0x0000000001656000-memory.dmp

    Filesize

    408KB