Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 13:59
Static task
static1
Behavioral task
behavioral1
Sample
b3c0573bd9d1709544d5a0125577a919.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3c0573bd9d1709544d5a0125577a919.exe
Resource
win10v2004-20231222-en
General
-
Target
b3c0573bd9d1709544d5a0125577a919.exe
-
Size
92KB
-
MD5
b3c0573bd9d1709544d5a0125577a919
-
SHA1
7ed9d9584a4a28432e744b0af17b9ade04464f2a
-
SHA256
6bb3d547a0b0f3532b325d2e94102319a2f590f9c1ae88c32f0b0201d11f1372
-
SHA512
fa43955eb722ac89fff971217ea41b9a03408023fe0c7c1509d1cd3aeb6ea8800709103cff630e8aafdd8ad0ecc89669ad29f8b65e8b0398b38ac787b3f0ba72
-
SSDEEP
1536:3JyS1HI2/UDzltQ1/IyLJbN6ZT9QJi9CsRWD1QajSiRhzPh:AGHQ81gyLmEARWD1QajzPh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1712 b3c0573bd9d1709544d5a0125577a919.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 b3c0573bd9d1709544d5a0125577a919.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 b3c0573bd9d1709544d5a0125577a919.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2264 b3c0573bd9d1709544d5a0125577a919.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2264 b3c0573bd9d1709544d5a0125577a919.exe 1712 b3c0573bd9d1709544d5a0125577a919.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1712 2264 b3c0573bd9d1709544d5a0125577a919.exe 29 PID 2264 wrote to memory of 1712 2264 b3c0573bd9d1709544d5a0125577a919.exe 29 PID 2264 wrote to memory of 1712 2264 b3c0573bd9d1709544d5a0125577a919.exe 29 PID 2264 wrote to memory of 1712 2264 b3c0573bd9d1709544d5a0125577a919.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3c0573bd9d1709544d5a0125577a919.exe"C:\Users\Admin\AppData\Local\Temp\b3c0573bd9d1709544d5a0125577a919.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\b3c0573bd9d1709544d5a0125577a919.exeC:\Users\Admin\AppData\Local\Temp\b3c0573bd9d1709544d5a0125577a919.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d40978453972d94957338d4bc5c5b828
SHA1c89a942eb44ba9100a5403bd7d1a6d07c9af163a
SHA256794c0224ca8a78ae221ba3c25c009df253b47713f72ddeb583df39709e256d22
SHA5124a144ee25ba41abbe053fd0192efda886f38f50393ab5841719499ee0b9fd794c8e68a995107b713f8f6479fda6b7be585d97a0ac3dbff5880ba3bdee6966d71