Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 03:08

General

  • Target

    961633b69e93de143896d782595afab6.exe

  • Size

    907KB

  • MD5

    961633b69e93de143896d782595afab6

  • SHA1

    d395ab16bf78062cc33ce51136dad51a62c865e9

  • SHA256

    804135bba7311e0eee67dec9a6908c3b0943fde9800266b0ec26864d261751bf

  • SHA512

    2eef625dc03c9d7219e8d826b673dc47668641412786047a00782fab389ce6b35c217735ae55b189d08ff4347835ce7cf2754108971c1e97c0073d9c0ff46e38

  • SSDEEP

    12288:eMv1aLsg4AI7ZknIHG9sxc4Ay8euoKRQMcla1o1V+5dyjOrtO1ZiushjVDa/ZS1:eMksJb9JGYc4Ay8HLerrVY8eusXa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\961633b69e93de143896d782595afab6.exe
    "C:\Users\Admin\AppData\Local\Temp\961633b69e93de143896d782595afab6.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\961633b69e93de143896d782595afab6.exe
      C:\Users\Admin\AppData\Local\Temp\961633b69e93de143896d782595afab6.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\961633b69e93de143896d782595afab6.exe

    Filesize

    907KB

    MD5

    1dc91cefc5bbb0a2d61dcfb357b35e5b

    SHA1

    2000f3aba531de2667ed6c06a77711670082b048

    SHA256

    183575a886417650843b1fdbb9d5ac8e28cf990fa8854104a0d85257313ed291

    SHA512

    a51fdbb81d40037d9c40a454132836b51b15611644d8b54326b3a280697e22e928c41d46ba1efee626d72a4b1a1380ab3dc2fd3b9d9c15ff5c069c0af67bdc46

  • memory/3572-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3572-1-0x0000000001750000-0x0000000001838000-memory.dmp

    Filesize

    928KB

  • memory/3572-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3572-11-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/5112-13-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/5112-14-0x00000000015B0000-0x0000000001698000-memory.dmp

    Filesize

    928KB

  • memory/5112-20-0x0000000005090000-0x000000000514B000-memory.dmp

    Filesize

    748KB

  • memory/5112-21-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/5112-30-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/5112-34-0x000000000C840000-0x000000000C8D8000-memory.dmp

    Filesize

    608KB