Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 07:01

General

  • Target

    cd6a0a66252d26b08ca2ea36ae3bb0d7.exe

  • Size

    907KB

  • MD5

    cd6a0a66252d26b08ca2ea36ae3bb0d7

  • SHA1

    1570d3e547c136cf9c3d343fda96cdceeecbfb2d

  • SHA256

    634dac259f12478abd4f666a4b54f27a4ed0cc718bab03a4550d52d92bdffb78

  • SHA512

    3681fafc389071eaf5d252727eab6cdda676bfaadfb54d0496a3015d94ab7b7e173517add4d0a6e44fc67037e7d4263272dd143d60fc9829edcc5aef691a575d

  • SSDEEP

    12288:wTrDwMl3nCcTeKpwxPLb40OGoHj85FVqYDmXjYi3FOYrdCAu9LhjVDa/ZS1:y9XCK8oiw4VqdYiVObPDa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd6a0a66252d26b08ca2ea36ae3bb0d7.exe
    "C:\Users\Admin\AppData\Local\Temp\cd6a0a66252d26b08ca2ea36ae3bb0d7.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\cd6a0a66252d26b08ca2ea36ae3bb0d7.exe
      C:\Users\Admin\AppData\Local\Temp\cd6a0a66252d26b08ca2ea36ae3bb0d7.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2420
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2348

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\cd6a0a66252d26b08ca2ea36ae3bb0d7.exe

            Filesize

            907KB

            MD5

            4ee3147effcbb66b158b59ec66a8aeeb

            SHA1

            f4d49e547294307f8aac22dc74c156b35b0f2d2c

            SHA256

            44416bc345cea3843254c5173e4cc0d815b36087047252e1a85507742457730e

            SHA512

            c487d29bbd7f670ad3cc497d5be59f1b1d213592c659062a29d4fc2dc6902ed8d44c8d365358019f4c7e6fd3429dc1c2663b2046fdc1e10ed8afe0980bb7bb93

          • memory/2420-13-0x0000000000400000-0x00000000004E8000-memory.dmp

            Filesize

            928KB

          • memory/2420-14-0x00000000015B0000-0x0000000001698000-memory.dmp

            Filesize

            928KB

          • memory/2420-20-0x0000000005090000-0x000000000514B000-memory.dmp

            Filesize

            748KB

          • memory/2420-21-0x0000000000400000-0x0000000000498000-memory.dmp

            Filesize

            608KB

          • memory/2420-30-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/2420-32-0x000000000B800000-0x000000000B898000-memory.dmp

            Filesize

            608KB

          • memory/4268-0-0x0000000000400000-0x00000000004E8000-memory.dmp

            Filesize

            928KB

          • memory/4268-1-0x0000000001700000-0x00000000017E8000-memory.dmp

            Filesize

            928KB

          • memory/4268-2-0x0000000000400000-0x00000000004BB000-memory.dmp

            Filesize

            748KB

          • memory/4268-11-0x0000000000400000-0x00000000004BB000-memory.dmp

            Filesize

            748KB