Analysis

  • max time kernel
    88s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 11:11

General

  • Target

    8f0128aca4f066df03655993b495fc52.exe

  • Size

    385KB

  • MD5

    8f0128aca4f066df03655993b495fc52

  • SHA1

    e251a7b3bcabf4c2e25618bddc2480ecf1280082

  • SHA256

    e41b357e9b03c70fbff36575862b6d72db8b7e82ac9db501ce9e59b7a233b18b

  • SHA512

    2e11c48e3b9e0aa7ea8292ad439e0b82a103242445c2c5fc1a2eeedbef68832fa849c5d96e64f8d17fe0e34cbfb5ec1b03cd35023598582a4b707fa1c11a20a5

  • SSDEEP

    6144:z0FIkAgxzcO53YJuCybbwiOhjAhCsoaxXW/AQulMZyp/d/wRaofOqA69GG6YJB:zqIUIJebaKhx91hdlMG/52LLkCJB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe
      C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe

    Filesize

    34KB

    MD5

    b5c5a0d43ebe307792549ad0b83c9b30

    SHA1

    5be5153eed5bf2e8a9d72a4bb67181271e23498f

    SHA256

    92ed7131b6426254feab3d66448ce82dcb9dc3ef63fafcc73607cbc8f53bf6a3

    SHA512

    9237096623c3aea33901d50abbdccf5be0d032dae62cdd5b62e327cc9afd6124c27f180c6e51d08e6d3a02f7221df913eb4b8acec1a4608b5e23d88183add3eb

  • memory/1560-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1560-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1560-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/1560-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3028-16-0x00000000015A0000-0x0000000001606000-memory.dmp

    Filesize

    408KB

  • memory/3028-14-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3028-21-0x0000000004EB0000-0x0000000004F0F000-memory.dmp

    Filesize

    380KB

  • memory/3028-20-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3028-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3028-35-0x000000000C640000-0x000000000C67C000-memory.dmp

    Filesize

    240KB

  • memory/3028-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB