Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
03810f6f6903e752c9d4de354e5cb030.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03810f6f6903e752c9d4de354e5cb030.exe
Resource
win10v2004-20231215-en
General
-
Target
03810f6f6903e752c9d4de354e5cb030.exe
-
Size
105KB
-
MD5
03810f6f6903e752c9d4de354e5cb030
-
SHA1
e3ec1ed1c9cbf62b071016f91c7543fe3941f15c
-
SHA256
e5b82def107317c4bea2aacfca1e8b5e224ac09120c3de943aae0a01678b9557
-
SHA512
38d14a225b433ce511b8c6d164cf6580495af91108cd07dd6d8ac78792aa0c39efeeab81897f17be41c748488238b32a96efbf7570a3603aba2f1c3c948eea31
-
SSDEEP
1536:UKLCuRGiQU5Z3Ridr9T3DIcNZao9/tjQqFdX57iTt6DtW9YH:LL5tQwZcdVD7VhQqFdpLpW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 460 03810f6f6903e752c9d4de354e5cb030.exe -
Executes dropped EXE 1 IoCs
pid Process 460 03810f6f6903e752c9d4de354e5cb030.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3016 03810f6f6903e752c9d4de354e5cb030.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3016 03810f6f6903e752c9d4de354e5cb030.exe 460 03810f6f6903e752c9d4de354e5cb030.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 460 3016 03810f6f6903e752c9d4de354e5cb030.exe 89 PID 3016 wrote to memory of 460 3016 03810f6f6903e752c9d4de354e5cb030.exe 89 PID 3016 wrote to memory of 460 3016 03810f6f6903e752c9d4de354e5cb030.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe"C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exeC:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:460
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD512bf4ed7b44375b9d1b9680a57d4bcd9
SHA10118af8a02b3a9163715d566757000e3eefd188f
SHA256dacece5c2a746b150882575cdf8ba92a4c77af9dde289415f53cf903e50c3530
SHA512bc573fdc9bf0220cc3e32369493f8ce44e496ba1a943a41c52d31f3393c1dfe1dbda5f6d6090945742684012ffc4bc3f9152b8ab280596f6f2353f594aec8f0e