Analysis

  • max time kernel
    89s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 09:49

General

  • Target

    9b5bea6e1ff86696a15434a4fc2698c9.exe

  • Size

    385KB

  • MD5

    9b5bea6e1ff86696a15434a4fc2698c9

  • SHA1

    214fe8def46d3dbfa085c415ccfc027919cd6c3c

  • SHA256

    6000d15283ee8d91f39cc58ed9a8dac8669915778575af8eda4cbc414e554bfd

  • SHA512

    cfeef1d544b36063d9d7344578804d307f23c171ac7f8c2b329c925404439cb1e848d362d27c205083a99e762cbe89821d96013b8847110ad5272c0525c600e9

  • SSDEEP

    12288:rdZJOrEF/jtCe9KUq9DiufomBvpR0A81VypXlAfU9UCt1ON/B:fJOYVke0UGDfomZpR0T1OXlAfU9UCt12

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b5bea6e1ff86696a15434a4fc2698c9.exe
    "C:\Users\Admin\AppData\Local\Temp\9b5bea6e1ff86696a15434a4fc2698c9.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Users\Admin\AppData\Local\Temp\9b5bea6e1ff86696a15434a4fc2698c9.exe
      C:\Users\Admin\AppData\Local\Temp\9b5bea6e1ff86696a15434a4fc2698c9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9b5bea6e1ff86696a15434a4fc2698c9.exe

    Filesize

    385KB

    MD5

    b89416c6c78ce31d31f585daddd30645

    SHA1

    784c9216a7b746b1756c856a48af7be9ae2b10fa

    SHA256

    8174042d3a3b11992ae6a0d27ed32af575fa8c432c07d4b46c94a735b5629354

    SHA512

    223836147969e0e3b6b055ef7764c07c408a9427f3017f88c21e7e13fecb4288152d6bee5cbb0cd0185000727f3dce361730b4311840d790d72a281bb099b2fe

  • memory/3264-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3264-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/3264-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3264-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4668-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4668-15-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4668-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4668-20-0x0000000004F00000-0x0000000004F5F000-memory.dmp

    Filesize

    380KB

  • memory/4668-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4668-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4668-36-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB