Analysis
-
max time kernel
220s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
37e05a1cdb54a18d4f3b2a25b2de06d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37e05a1cdb54a18d4f3b2a25b2de06d2.exe
Resource
win10v2004-20231215-en
General
-
Target
37e05a1cdb54a18d4f3b2a25b2de06d2.exe
-
Size
165KB
-
MD5
37e05a1cdb54a18d4f3b2a25b2de06d2
-
SHA1
f901b145c62a8b4c8b9ec1619fdfd50b60061b32
-
SHA256
c114f54f29249ad4ef07fe4fc37bbd2ad8c1b1be6a0218ffbaaf4a51ee3c1ad3
-
SHA512
24b86a06c8fb1cb622793bcbf829ea81c16f9053f4c9ef25d7b052eaa8bfdf0e5cf4c9d1e7172c4aa8838ddbdeeaf2549693937093503a19f187ba05d11abbe4
-
SSDEEP
3072:FrgzVVuBmZLNOuk3KsEw9ignYJzP6kkt4UjwIirqyYaT5hT:xPULWasVcgYJD6kkqsiLr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3756 37e05a1cdb54a18d4f3b2a25b2de06d2.exe -
Executes dropped EXE 1 IoCs
pid Process 3756 37e05a1cdb54a18d4f3b2a25b2de06d2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1712 37e05a1cdb54a18d4f3b2a25b2de06d2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 37e05a1cdb54a18d4f3b2a25b2de06d2.exe 3756 37e05a1cdb54a18d4f3b2a25b2de06d2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3756 1712 37e05a1cdb54a18d4f3b2a25b2de06d2.exe 94 PID 1712 wrote to memory of 3756 1712 37e05a1cdb54a18d4f3b2a25b2de06d2.exe 94 PID 1712 wrote to memory of 3756 1712 37e05a1cdb54a18d4f3b2a25b2de06d2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e05a1cdb54a18d4f3b2a25b2de06d2.exe"C:\Users\Admin\AppData\Local\Temp\37e05a1cdb54a18d4f3b2a25b2de06d2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\37e05a1cdb54a18d4f3b2a25b2de06d2.exeC:\Users\Admin\AppData\Local\Temp\37e05a1cdb54a18d4f3b2a25b2de06d2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5a67ebe52303ff72e75dc8c40b7907dc0
SHA18ffdf89da13f4c2b28ff0478dbb6fea1105d1b5c
SHA25648cb4c3ed022742d86784cbd488bc31f01a73791bf8cfb078c99af93775bd0fd
SHA512f5e660576350b77cca3c8eca194bd7daa69033e3226837e07b73d645fdee550148a3c1e3a285507eee9e32e4ad626345688fa86e00f59f774b262b857cbb28ab