Analysis
-
max time kernel
163s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:20
Static task
static1
Behavioral task
behavioral1
Sample
37c3a8de48dc3f4e251d7df501b848e3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37c3a8de48dc3f4e251d7df501b848e3.exe
Resource
win10v2004-20231215-en
General
-
Target
37c3a8de48dc3f4e251d7df501b848e3.exe
-
Size
385KB
-
MD5
37c3a8de48dc3f4e251d7df501b848e3
-
SHA1
f76ab69209e432bc4fc5108a933205230002d2f8
-
SHA256
20a96de56822c2365557809a785bff662b21e552cdfcc6ce1a090e78dffe8c47
-
SHA512
64a17db3c1ccee0ba0964b2d99df702124e854938b330f472194a7e63b6b3ddd1f67a79db44f9baf4c5cd153105481236f7e403990cdf12a1308849a52360e69
-
SSDEEP
12288:j8adAbs4k9SzifoyCAGT1acB/sx2tQm8XDOHSMdT86oB:AHkdfoAk1acBPQm8GS0T86oB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2172 37c3a8de48dc3f4e251d7df501b848e3.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 37c3a8de48dc3f4e251d7df501b848e3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1944 37c3a8de48dc3f4e251d7df501b848e3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1944 37c3a8de48dc3f4e251d7df501b848e3.exe 2172 37c3a8de48dc3f4e251d7df501b848e3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2172 1944 37c3a8de48dc3f4e251d7df501b848e3.exe 91 PID 1944 wrote to memory of 2172 1944 37c3a8de48dc3f4e251d7df501b848e3.exe 91 PID 1944 wrote to memory of 2172 1944 37c3a8de48dc3f4e251d7df501b848e3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c3a8de48dc3f4e251d7df501b848e3.exe"C:\Users\Admin\AppData\Local\Temp\37c3a8de48dc3f4e251d7df501b848e3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\37c3a8de48dc3f4e251d7df501b848e3.exeC:\Users\Admin\AppData\Local\Temp\37c3a8de48dc3f4e251d7df501b848e3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fadc62d4d7bb9fdd615106c31e0fcea5
SHA173ed9ca4022f43da2a98ce592aeeb4baaa16afa3
SHA256b2d05fa7f633253ca7ae6f225a2a4d19f26dd77b66348ac9075b51ade2592635
SHA512e1a6fcf421ea94e67e65d40d6d71961e0fa65c2754ca381fd084e4beead2a6788caf88a70d4edd75454322c70d44d713cdb9c479aaf6a0dff015c66fc35b784c