Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 14:06
Static task
static1
Behavioral task
behavioral1
Sample
3ddc846fa101358f3a776b5e183a809c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ddc846fa101358f3a776b5e183a809c.exe
Resource
win10v2004-20231201-en
General
-
Target
3ddc846fa101358f3a776b5e183a809c.exe
-
Size
1.9MB
-
MD5
3ddc846fa101358f3a776b5e183a809c
-
SHA1
3826057dae5a4faf3c2db374159324fe9e4962b8
-
SHA256
8eaf560507ff55313eaf8b2bc783c2d3045bba32402d997f16ebce1432f3415d
-
SHA512
bf5463f81ba3b8b11bcc067627c0880dc56c1e86ad9404b9e0d3daf4732241025ee89f29cafc39b4cc91a68147fcd5a31c00ce4b7c953b3f7d7c0938c0eac0ad
-
SSDEEP
49152:Qoa1taC070dH88iKIbqNOAQiMp/r5dT037HLcDv25hN:Qoa1taC0r8DBNOAQPrOq25r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3020 9A8B.tmp -
Executes dropped EXE 1 IoCs
pid Process 3020 9A8B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2960 3ddc846fa101358f3a776b5e183a809c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3020 2960 3ddc846fa101358f3a776b5e183a809c.exe 28 PID 2960 wrote to memory of 3020 2960 3ddc846fa101358f3a776b5e183a809c.exe 28 PID 2960 wrote to memory of 3020 2960 3ddc846fa101358f3a776b5e183a809c.exe 28 PID 2960 wrote to memory of 3020 2960 3ddc846fa101358f3a776b5e183a809c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ddc846fa101358f3a776b5e183a809c.exe"C:\Users\Admin\AppData\Local\Temp\3ddc846fa101358f3a776b5e183a809c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\9A8B.tmp"C:\Users\Admin\AppData\Local\Temp\9A8B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3ddc846fa101358f3a776b5e183a809c.exe C7C25A2E8B975237E3BCCED2E02263D63A4A5E08B3E56D290DEDCDEAEE1CFF1DDA718EA824CD6AC16B8E0F558BA3206C6008DEAFD5D5E9BC1DB5763CE3BD7C182⤵
- Deletes itself
- Executes dropped EXE
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f23a401bfaeee8305063096e08168df4
SHA1dab2983cac3e5cdaf316f87277cc070c13f83f69
SHA2567fd877297c15050d7faba7154b7f23b1c2d9f7094f770715fce83255d3b56e89
SHA512d62ff1c91328a2fc0de67f5627b30918acf164464be250d1cbb911466adb9d998866c5be303f6b6fe30f02e34d34c4265fb09d03371c508e33cb084ad36e3054