Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3741770fb2159e392df01de58af00235.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3741770fb2159e392df01de58af00235.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
3741770fb2159e392df01de58af00235.exe
-
Size
2.0MB
-
MD5
3741770fb2159e392df01de58af00235
-
SHA1
11cc637f7cba68a53d23bfecd05590a6fc60e8b9
-
SHA256
5a65aa47f6237b4bb3ce71e965a64df22ad64ea2364f9811c0c8f37a35b9286d
-
SHA512
1bdad311fa2bbb688f2566074be03a554c573c1fa78106d43df4b76f34d7b15a560683e1e0981c89ba9ae994764e3e54308b072ac1d9a8dfa7813796e1456529
-
SSDEEP
49152:5a+jy1OVV38OqtnGfaV0lA+sE6AoeuH0t1lLJdpinXBgJ:QXOVY9caVYjsKotHkdgRgJ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4700 3741770fb2159e392df01de58af00235.tmp -
Loads dropped DLL 4 IoCs
pid Process 4700 3741770fb2159e392df01de58af00235.tmp 4700 3741770fb2159e392df01de58af00235.tmp 4700 3741770fb2159e392df01de58af00235.tmp 4700 3741770fb2159e392df01de58af00235.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 4700 324 3741770fb2159e392df01de58af00235.exe 17 PID 324 wrote to memory of 4700 324 3741770fb2159e392df01de58af00235.exe 17 PID 324 wrote to memory of 4700 324 3741770fb2159e392df01de58af00235.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3741770fb2159e392df01de58af00235.exe"C:\Users\Admin\AppData\Local\Temp\3741770fb2159e392df01de58af00235.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\is-8S4M6.tmp\3741770fb2159e392df01de58af00235.tmp"C:\Users\Admin\AppData\Local\Temp\is-8S4M6.tmp\3741770fb2159e392df01de58af00235.tmp" /SL5="$D0060,1686916,54272,C:\Users\Admin\AppData\Local\Temp\3741770fb2159e392df01de58af00235.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4700
-