Analysis

  • max time kernel
    154s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 10:19

General

  • Target

    992b150ee3d2bb8bbbb7d75d433342db.exe

  • Size

    771KB

  • MD5

    992b150ee3d2bb8bbbb7d75d433342db

  • SHA1

    0ce667e48bed505225ace9d4e31b324633b77ffc

  • SHA256

    4242673243627a83a218cd0f871442ee290e689cfac6452770a7065ce45313f5

  • SHA512

    42ccf6185157f7af5eb47ff5d95acdbaf79aa7a2c8ff86ef20ec6b8c9449df7e1241cd6e30c65d550c6bca747f1da3c9ecf5dd4e4d83ec387cc57a9404ccf13d

  • SSDEEP

    24576:MsqjuQ2IW7z6qbIb10hJaothZ2/T6FBBB:MsMuQzqbq/ofT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe
    "C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe
      C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe

    Filesize

    771KB

    MD5

    46df32f3df4d7a6a18f1ad6d7f4768b1

    SHA1

    c91a11cfd2f2400c45a1724b78172c98d696753e

    SHA256

    38710e0797089629ab3b69d08d0e3cf1c6f0d7d7e5f208bc0e7968de3233a384

    SHA512

    e6189ba06c3ccedfdb7cf0ee50bdda1939c1982a0b5839a9de278107d5e63ccf945a8ee7017907534844ae200be6dee42d92da43e260f558849d07c6efd56159

  • memory/2296-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2296-1-0x0000000001600000-0x0000000001666000-memory.dmp

    Filesize

    408KB

  • memory/2296-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2296-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4292-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4292-14-0x00000000015F0000-0x0000000001656000-memory.dmp

    Filesize

    408KB

  • memory/4292-20-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

    Filesize

    380KB

  • memory/4292-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4292-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4292-33-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/4292-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB