Analysis

  • max time kernel
    193s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 01:04

General

  • Target

    bd4185c304af86da85a9acfe4321e37d.exe

  • Size

    385KB

  • MD5

    bd4185c304af86da85a9acfe4321e37d

  • SHA1

    2c8e24d77031a1d2742509335564f8fe71cb7140

  • SHA256

    f8833dcd6b9bc7eaf6501954477a18be98821232641ac762e8263269bc5e6380

  • SHA512

    ba5c57dd94d5fab326ecb408bba1e7035a388a773e142c6ce519f3a6120a91d08a9292e9d271b2d98321dee63eb8d5b585b903124b5d4e14485b8c91aa93a986

  • SSDEEP

    6144:dKQ1qN5cFVShKHL14RfCuL/nsZDkZBLHyRduxefUpsfvUFr2kv3B:sQ1qLcyh2L14Rz/ns1ULQdu+CKvyRvB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe
      C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe

          Filesize

          385KB

          MD5

          fca9e872a00cab82d16ec71a9d04cd37

          SHA1

          eb88dd6c8c0d30e40b7f4cca7a2bc49269c7e257

          SHA256

          405e359bb3e913881108188b3a54ed0813502a392e815c0138643da56ec7e5d8

          SHA512

          4289ed87bdd9fdc954b3f2ae3d411819c81c34d4e3518532969f4d61f6f62f097af4d4ab51579b3780bfdca1f7ee9fe5d37945cf1f40447d37739f75246e2b3e

        • memory/2564-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/2564-1-0x0000000000150000-0x00000000001B6000-memory.dmp

          Filesize

          408KB

        • memory/2564-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2564-11-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/3120-13-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/3120-14-0x0000000001610000-0x0000000001676000-memory.dmp

          Filesize

          408KB

        • memory/3120-20-0x0000000004EA0000-0x0000000004EFF000-memory.dmp

          Filesize

          380KB

        • memory/3120-21-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/3120-33-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3120-36-0x000000000B700000-0x000000000B73C000-memory.dmp

          Filesize

          240KB

        • memory/3120-39-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB