Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 00:10

General

  • Target

    b6031ea08ee6cd0be92f62f9db00cd2a.exe

  • Size

    907KB

  • MD5

    b6031ea08ee6cd0be92f62f9db00cd2a

  • SHA1

    1a73c480b21824a571df3ad78996996a5467bad7

  • SHA256

    ff385247bf85a02d4e611cc26f1aa672dc55463296b79288b0dd0d3dbbfe87da

  • SHA512

    b617d0bbe0e15a33d585102de2b8e758d6f017d52876754271f92347bc11f5f65511a74907d7abd51d79451a97367aa387dae6245aac1472b6ab4a13b71cd9dd

  • SSDEEP

    24576:YG298enQHrR2f0OMgFFgTaYTrCvvY1QJmp4A8Pcla/ZS1:YG2Iof0JKvFmpZ8EgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe
    "C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe
      C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:992

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe

          Filesize

          907KB

          MD5

          a0e9dad8bc4629f200c76ba7f263e602

          SHA1

          fb58e2030f9a232ef6064fdb043c1cf93e1a4c55

          SHA256

          7c0882c58b563e78563e12f0d3f49a53dbea7e16b0744b0a1b186d13366f7dec

          SHA512

          cdfe8d83e24ef8fdd8f68ced823dc92aad97811857d87b878cbaced2c8a20fd1f37cba851981371f0ba25cca08e4d99a98a7c2f3170bc0d2a3f29c2c65c89ca8

        • memory/992-13-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/992-15-0x0000000001630000-0x0000000001718000-memory.dmp

          Filesize

          928KB

        • memory/992-21-0x00000000051D0000-0x000000000528B000-memory.dmp

          Filesize

          748KB

        • memory/992-20-0x0000000000400000-0x0000000000498000-memory.dmp

          Filesize

          608KB

        • memory/992-32-0x000000000B800000-0x000000000B898000-memory.dmp

          Filesize

          608KB

        • memory/992-30-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4296-0-0x0000000000400000-0x00000000004E8000-memory.dmp

          Filesize

          928KB

        • memory/4296-1-0x00000000017B0000-0x0000000001898000-memory.dmp

          Filesize

          928KB

        • memory/4296-2-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB

        • memory/4296-12-0x0000000000400000-0x00000000004BB000-memory.dmp

          Filesize

          748KB