Analysis
-
max time kernel
190s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3b5af95a868d022b9c0b6f07f02ec27e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b5af95a868d022b9c0b6f07f02ec27e.exe
Resource
win10v2004-20231215-en
General
-
Target
3b5af95a868d022b9c0b6f07f02ec27e.exe
-
Size
84KB
-
MD5
3b5af95a868d022b9c0b6f07f02ec27e
-
SHA1
89d3476d27f861cc1bf0a11a679dfd113ab2e03f
-
SHA256
c38aef4047bf4ef7953f8684d8b3cdddfc0eeaace327716b6114c10c8391d35e
-
SHA512
e0d6edef6a501fbae9e28c97776ce3770d3ef4f2247ccd3e91577796d2531435264f19cf19d938e15bd9c2e9f2293b717435189ef3fbe5782b4b238751355d25
-
SSDEEP
1536:BgP1fpIHqQS6YRsbWtA/m/9dNp1npOjUwznVfUVmlbziEcpYyL:C1RIHqX/sbWtAu/n1pctxfUVml4pYy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 3b5af95a868d022b9c0b6f07f02ec27e.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 3b5af95a868d022b9c0b6f07f02ec27e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4384 3b5af95a868d022b9c0b6f07f02ec27e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4384 3b5af95a868d022b9c0b6f07f02ec27e.exe 3056 3b5af95a868d022b9c0b6f07f02ec27e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3056 4384 3b5af95a868d022b9c0b6f07f02ec27e.exe 91 PID 4384 wrote to memory of 3056 4384 3b5af95a868d022b9c0b6f07f02ec27e.exe 91 PID 4384 wrote to memory of 3056 4384 3b5af95a868d022b9c0b6f07f02ec27e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5af95a868d022b9c0b6f07f02ec27e.exe"C:\Users\Admin\AppData\Local\Temp\3b5af95a868d022b9c0b6f07f02ec27e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3b5af95a868d022b9c0b6f07f02ec27e.exeC:\Users\Admin\AppData\Local\Temp\3b5af95a868d022b9c0b6f07f02ec27e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD532bf138b421aa806b8484da7e7de6af8
SHA13478e9e705d5caf2d87c85dd6857e57ed7ad8fa4
SHA256b8c07132ec454828cdaf7ef5b9345820a7816b128b803d0c9580965ef79a4251
SHA5123c74dcfa3830022974bb0446da183c8a44b4a9a8c0060057349cc5b7d9c4858225d1304467af7ff9deadc48666989a01a4403bf37b39a89f57f38374a2f7a73c