Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 10:06

General

  • Target

    e16988057803aec0dba9f5e6b8b12c28.exe

  • Size

    385KB

  • MD5

    e16988057803aec0dba9f5e6b8b12c28

  • SHA1

    939cf6bb232fcacb13b600ab8bcac261f963f4e4

  • SHA256

    83c735d6da56fe9d5e7e56a8ee7bf3dda8685ce5bc86eb4294828ccc2187b3a1

  • SHA512

    7a156ae6f61871db03c760b346f025b38f8331f11d650d110adb68352f4f94fb3d2883b863997f2281fa9459dae101f29d21f5fb43b0d21602eed6e832c07e6e

  • SSDEEP

    12288:khh1zc0LjGimj9ZWBHecwtYcL1il0AB6LjgrMaCieyWXXRr2O5HdKM+B:kHVVjGimj9ZWXwlXkM5LeB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe
    "C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4168
    • C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe
      C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe

          Filesize

          385KB

          MD5

          0933d92817c3b66d76fd6da018ba71b0

          SHA1

          b0933474b891f63e07f441c1704de093c9a0e652

          SHA256

          fe708fb6ac09b14b46e1553ab4d8cc2002b438bb07b17f8da602f04f8cb950bd

          SHA512

          eb0c0ce7c19d7bf8b9400edf1b6a31a4d032596c60087687b9f8928b6fd8b455dc1ed9219600fcad3b0ffad0cda2e4a9e61719b7abc8aaab270ccd398f6974ae

        • memory/4168-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/4168-1-0x00000000014D0000-0x0000000001536000-memory.dmp

          Filesize

          408KB

        • memory/4168-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4168-11-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4228-13-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/4228-15-0x0000000001470000-0x00000000014D6000-memory.dmp

          Filesize

          408KB

        • memory/4228-20-0x0000000004F30000-0x0000000004F8F000-memory.dmp

          Filesize

          380KB

        • memory/4228-21-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/4228-32-0x000000000B600000-0x000000000B63C000-memory.dmp

          Filesize

          240KB

        • memory/4228-30-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/4228-36-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB