Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:44

General

  • Target

    03810f6f6903e752c9d4de354e5cb030.exe

  • Size

    105KB

  • MD5

    03810f6f6903e752c9d4de354e5cb030

  • SHA1

    e3ec1ed1c9cbf62b071016f91c7543fe3941f15c

  • SHA256

    e5b82def107317c4bea2aacfca1e8b5e224ac09120c3de943aae0a01678b9557

  • SHA512

    38d14a225b433ce511b8c6d164cf6580495af91108cd07dd6d8ac78792aa0c39efeeab81897f17be41c748488238b32a96efbf7570a3603aba2f1c3c948eea31

  • SSDEEP

    1536:UKLCuRGiQU5Z3Ridr9T3DIcNZao9/tjQqFdX57iTt6DtW9YH:LL5tQwZcdVD7VhQqFdpLpW9i

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe
    "C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe
      C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:460

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\03810f6f6903e752c9d4de354e5cb030.exe

          Filesize

          105KB

          MD5

          12bf4ed7b44375b9d1b9680a57d4bcd9

          SHA1

          0118af8a02b3a9163715d566757000e3eefd188f

          SHA256

          dacece5c2a746b150882575cdf8ba92a4c77af9dde289415f53cf903e50c3530

          SHA512

          bc573fdc9bf0220cc3e32369493f8ce44e496ba1a943a41c52d31f3393c1dfe1dbda5f6d6090945742684012ffc4bc3f9152b8ab280596f6f2353f594aec8f0e

        • memory/460-13-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/460-15-0x00000000001B0000-0x00000000001DF000-memory.dmp

          Filesize

          188KB

        • memory/460-20-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/460-25-0x00000000014E0000-0x00000000014FB000-memory.dmp

          Filesize

          108KB

        • memory/3016-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3016-1-0x00000000000F0000-0x000000000011F000-memory.dmp

          Filesize

          188KB

        • memory/3016-2-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3016-12-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB