Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 10:28

General

  • Target

    a38cdaab062f1561f554f9ff2f14fb98.exe

  • Size

    385KB

  • MD5

    a38cdaab062f1561f554f9ff2f14fb98

  • SHA1

    f918478ca0ff8d79d6b0e941952ab5d1ee22c84b

  • SHA256

    c481fc82906f87de6b82ae08990ad1a62aa7bb616b6ead1667e33d1b69fbacfa

  • SHA512

    797c103ed40dace91fd7803131cba2650a8248833f7d8e6a7fe3b46c346f393bc20343c389d0cfc5678bb389d03d15bc4f9734fc9ba1b41c727d464a87fd99ec

  • SSDEEP

    12288:vuj0wOFeoh542n7x1JC39Rxc5y/W4yyGMrT1Mm6rgB:sOFeoTl1QBc5EWpsrTqm6rgB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe
    "C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe
      C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe

          Filesize

          385KB

          MD5

          73c51da96164fa166a2f1c92536d0dec

          SHA1

          3abede5f1f9d2e7a82627431b18d27b8fe761aed

          SHA256

          13b14d661fd24aae49daebddf3093b0dc5eed05a4e505167f3a51988a019078a

          SHA512

          0897dea3a1578c96ce80dcec1b8596961d89686ec987cdf871c65347d9aa2310a87cd575c95c18605dd6452f31584f5532fda613588247fedf6764899a7c53be

        • memory/1052-13-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/1052-17-0x0000000001600000-0x0000000001666000-memory.dmp

          Filesize

          408KB

        • memory/1052-21-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1052-20-0x0000000004ED0000-0x0000000004F2F000-memory.dmp

          Filesize

          380KB

        • memory/1052-30-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1052-35-0x000000000B600000-0x000000000B63C000-memory.dmp

          Filesize

          240KB

        • memory/1052-36-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3300-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/3300-1-0x0000000000140000-0x00000000001A6000-memory.dmp

          Filesize

          408KB

        • memory/3300-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/3300-12-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB