Analysis

  • max time kernel
    144s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 16:09

General

  • Target

    e2137d3cec69228f87df6cd4d33aa1ad.exe

  • Size

    385KB

  • MD5

    e2137d3cec69228f87df6cd4d33aa1ad

  • SHA1

    6ad3b5740f00d161e58f8451309b4ca02c343fe3

  • SHA256

    608cfa38851fec23946f038a561b3bc74d92f78f1ce7bdbf7f34efe101703e09

  • SHA512

    c42fbf347e8701087bd46352a2d636ec4aa1e92abfd8da0f53ab4506b7e454959ecf5250342e839768e53becc66ab4c9de26ad2e6ade1b60ba7c341fa57a654f

  • SSDEEP

    6144:nUfGfv3cKCr6uubys21OWIplM8MKSCXsxjXWhBIDojCD3amg2nDVYbLOqOInB:Vt01VT8SCSjXWbeoY3amRnZYeqOoB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2137d3cec69228f87df6cd4d33aa1ad.exe
    "C:\Users\Admin\AppData\Local\Temp\e2137d3cec69228f87df6cd4d33aa1ad.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\e2137d3cec69228f87df6cd4d33aa1ad.exe
      C:\Users\Admin\AppData\Local\Temp\e2137d3cec69228f87df6cd4d33aa1ad.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e2137d3cec69228f87df6cd4d33aa1ad.exe

    Filesize

    385KB

    MD5

    750a29129d6ea00fea0d683cb744e5c2

    SHA1

    13e657dc6dd9ed2b2d97ccd050a622accbf32a4e

    SHA256

    ac25b0739d2973a02776e6db6f15ccd289dbbb87f895f749b1fb8b07d08223ff

    SHA512

    af17a138e32025e0251a48f2b1d5f77e827342c2576bd1a89bbb0415eeb9b6fe2cac8c56ab098d05af0bcf2a780ad54dca4ba1eeb80e19b49931079473088fc5

  • memory/2888-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2888-16-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2888-20-0x0000000004F40000-0x0000000004F9F000-memory.dmp

    Filesize

    380KB

  • memory/2888-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2888-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2888-36-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/2888-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3568-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3568-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/3568-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3568-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB