Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:18
Behavioral task
behavioral1
Sample
3757379c7e84174ac584ded6f2afddd0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3757379c7e84174ac584ded6f2afddd0.exe
Resource
win10v2004-20231215-en
General
-
Target
3757379c7e84174ac584ded6f2afddd0.exe
-
Size
1.3MB
-
MD5
3757379c7e84174ac584ded6f2afddd0
-
SHA1
40c3ebbb4450c03cf922bbe54399f008676d6ac2
-
SHA256
30946556dc9fae7407ee14c8f790b57b500e2af98fd1ee1b23f35bb8a2849a36
-
SHA512
e22e95cc381e180d465ad69ff26e592e1f0237f087b01d1409cc9321d1ac1665674e38d7aad89d5a752944276c6be328943f7ce75535cf5412dd987c69f1386d
-
SSDEEP
24576:mUsj/+GUZh+wMKy4+DjmAJ72GzNab+vMsm86qhvG:pi/d2h+ZR4mjmAh9aykVq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 3757379c7e84174ac584ded6f2afddd0.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 3757379c7e84174ac584ded6f2afddd0.exe -
resource yara_rule behavioral2/memory/1716-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/files/0x000c00000002317f-12.dat upx behavioral2/memory/2444-16-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1716 3757379c7e84174ac584ded6f2afddd0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1716 3757379c7e84174ac584ded6f2afddd0.exe 2444 3757379c7e84174ac584ded6f2afddd0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2444 1716 3757379c7e84174ac584ded6f2afddd0.exe 20 PID 1716 wrote to memory of 2444 1716 3757379c7e84174ac584ded6f2afddd0.exe 20 PID 1716 wrote to memory of 2444 1716 3757379c7e84174ac584ded6f2afddd0.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3757379c7e84174ac584ded6f2afddd0.exe"C:\Users\Admin\AppData\Local\Temp\3757379c7e84174ac584ded6f2afddd0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3757379c7e84174ac584ded6f2afddd0.exeC:\Users\Admin\AppData\Local\Temp\3757379c7e84174ac584ded6f2afddd0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD524d9f39da9556fe437d01cd7c39c181a
SHA133d6122f512e785ea1d4963554ff85623e2df22f
SHA2569b2dbfce1e8b777de5d3c4bb58a0e6baa7363619087495d24d947b282c078b8e
SHA512691b6ed98a160f1a5c912c908fef17d8694082eac5ed4ac8f235583dc13a79104ce2eef30df7e1cd65b00da51e907b8278e463f73e4100314280e5e7dacb7af0