Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2024 12:45

General

  • Target

    9975382adcfe6a4eadf82facf5cdf756.exe

  • Size

    907KB

  • MD5

    9975382adcfe6a4eadf82facf5cdf756

  • SHA1

    a279814fc2c601d042a359e2537a0c09072b36ea

  • SHA256

    6d5c496d087573ccf5b8211aec5a88e70ec7981f473db9734e16c735040a5f11

  • SHA512

    3875b02a21c620c7c272cfcf2e0bed81cc84b1cb31c653bcce2f9523a3261b9355e9310f063dfe01b2187b0e97d93c76dbfcbe978dcaad987b18fff973548181

  • SSDEEP

    24576:DuPZ0Wy3HbJtQCBP6eSC07cfza8GCrCUCRpgt9+MxX51a/ZS1:VjFfzjmUCH0+UTgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe
    "C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe
      C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe

    Filesize

    907KB

    MD5

    3a63777d636c44fdfbf83fb7042c4d03

    SHA1

    7674bc1e07b919662728a28398a81b5132e772c8

    SHA256

    84e338ddf07314ba78b73d43ea48fdbdb93f07a22923adae0beb087e91b1f1e5

    SHA512

    68c626a89593f34cf5cd47d96639e5ec47d71a926dcfa8d25995f7d3f30dc55d9ebfb075fe1f537742c7eb12debba7a02b7b2e2bf956deae88912baf9d27aa97

  • memory/1132-13-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1132-17-0x0000000001700000-0x00000000017E8000-memory.dmp

    Filesize

    928KB

  • memory/1132-20-0x0000000005140000-0x00000000051FB000-memory.dmp

    Filesize

    748KB

  • memory/1132-21-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/1132-31-0x000000000B800000-0x000000000B898000-memory.dmp

    Filesize

    608KB

  • memory/1132-30-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/1664-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1664-1-0x00000000015B0000-0x0000000001698000-memory.dmp

    Filesize

    928KB

  • memory/1664-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/1664-11-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB