Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 01:55

General

  • Target

    8a99cbf977e780f8380309559fd7583f.exe

  • Size

    385KB

  • MD5

    8a99cbf977e780f8380309559fd7583f

  • SHA1

    bd58edb96d95751fe47946860eec358eed50f583

  • SHA256

    b06dfcbdfb94150b0372e1ae2cb28c4f731d0bd748673862adb6f7a3511ded8b

  • SHA512

    836b518705cd23b4137506d06ba4dd13dc3548f3a210e1e80e8dce3831b53cc7e0f8f43db0e9154e902b5371800fa0ddb26c428cbe1c12f41b03ab10f30ec43a

  • SSDEEP

    6144:idI4rOWamWqyEdoR1cBXYwpJYLKeJDYwgll+yJ/F6owDrfMq82aJxiMmBoUAOR+r:SrOWNbFpJUtD7gbx/sVfM1JxXtORWLB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe
    "C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe
      C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe

    Filesize

    385KB

    MD5

    3923f74ed6202c7299ad28e1c5c84518

    SHA1

    90ad3c644a85195668b26ace28c74046721c3934

    SHA256

    0391f3fcbae3356638bbcc2b1b51a5e00aa56024f6e7c990d1e3bbbf609f1a2b

    SHA512

    aa33cc518bc300cfbbe868352a0581fa6a5c13df9d76c580d50ccb5de435efb624b4859c3f8a33d0d6ac4dfed26d0eff3b56317f6017dfb99466aa2c298a620a

  • memory/2580-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2580-15-0x0000000000150000-0x00000000001B6000-memory.dmp

    Filesize

    408KB

  • memory/2580-20-0x0000000004E90000-0x0000000004EEF000-memory.dmp

    Filesize

    380KB

  • memory/2580-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2580-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2580-37-0x000000000C620000-0x000000000C65C000-memory.dmp

    Filesize

    240KB

  • memory/2580-38-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3216-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3216-1-0x00000000015E0000-0x0000000001646000-memory.dmp

    Filesize

    408KB

  • memory/3216-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3216-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB