Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3479a5d3b04585d4257abb0335f5f197.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
3479a5d3b04585d4257abb0335f5f197.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
3479a5d3b04585d4257abb0335f5f197.exe
-
Size
385KB
-
MD5
3479a5d3b04585d4257abb0335f5f197
-
SHA1
e324867a164f0f7979e229195b954aef279668a7
-
SHA256
b5db3743bfc4a79f8fe3f896d1094b34fcbfb775efb4aabc2630989207756d58
-
SHA512
01ff0d9b73ec973eed145cab7e63c2e2146acb9daad80757f7b481380a38386820d4c9655baec551879f2a36c481d7a6874f246b66ff030caeff1ec2c93a3c2c
-
SSDEEP
6144:z5Nks6zso0fyU90ZH8HFUSNwiFLGAcEXUBqpBEvqVK5kRNIemXweEFzBEB:0s6zs7ft9098HFUSqVq4XkRNtmcFzKB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2968 3479a5d3b04585d4257abb0335f5f197.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 3479a5d3b04585d4257abb0335f5f197.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 3479a5d3b04585d4257abb0335f5f197.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2080 3479a5d3b04585d4257abb0335f5f197.exe 2968 3479a5d3b04585d4257abb0335f5f197.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2968 2080 3479a5d3b04585d4257abb0335f5f197.exe 40 PID 2080 wrote to memory of 2968 2080 3479a5d3b04585d4257abb0335f5f197.exe 40 PID 2080 wrote to memory of 2968 2080 3479a5d3b04585d4257abb0335f5f197.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3479a5d3b04585d4257abb0335f5f197.exe"C:\Users\Admin\AppData\Local\Temp\3479a5d3b04585d4257abb0335f5f197.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3479a5d3b04585d4257abb0335f5f197.exeC:\Users\Admin\AppData\Local\Temp\3479a5d3b04585d4257abb0335f5f197.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2968
-