Analysis
-
max time kernel
150s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
3874989793d0d57a243a156ae1647628.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3874989793d0d57a243a156ae1647628.exe
Resource
win10v2004-20231215-en
General
-
Target
3874989793d0d57a243a156ae1647628.exe
-
Size
385KB
-
MD5
3874989793d0d57a243a156ae1647628
-
SHA1
227daeb0dd1b6bac7b1ff0ef2331ff096fd0b59c
-
SHA256
c17cad1ffb2e133641d46c5b1447951a9d8937927b6c7a5b49bf3e43a6217965
-
SHA512
3637b3c6ff6bfc630d62fcd11666ca6f3b4b36e902f8abbedbe483e101fb960f698c8e946f62e965c5023d96d73cb4997d24d5330abec33bc0a0afc87bf07136
-
SSDEEP
12288:k2hAQMYqa7KeSDSZ0R/fDWaZhgZr+YARbsgjB:k2uQMbp8Z0RXDBYZrXANHB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4908 3874989793d0d57a243a156ae1647628.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 3874989793d0d57a243a156ae1647628.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3084 3874989793d0d57a243a156ae1647628.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3084 3874989793d0d57a243a156ae1647628.exe 4908 3874989793d0d57a243a156ae1647628.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4908 3084 3874989793d0d57a243a156ae1647628.exe 57 PID 3084 wrote to memory of 4908 3084 3874989793d0d57a243a156ae1647628.exe 57 PID 3084 wrote to memory of 4908 3084 3874989793d0d57a243a156ae1647628.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\3874989793d0d57a243a156ae1647628.exe"C:\Users\Admin\AppData\Local\Temp\3874989793d0d57a243a156ae1647628.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\3874989793d0d57a243a156ae1647628.exeC:\Users\Admin\AppData\Local\Temp\3874989793d0d57a243a156ae1647628.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58f2354d92443faa07f26ddfdb246f3a4
SHA1c238fe59c811ac8c1e9743c293a25af0e75e9f8b
SHA256209c562a299f019ab31f9764d48ce617344560c8a7ba2dae7a30e3b437f9f657
SHA512d887b5642eb9ff88e2f01b2ca2870450f70a4320a92d020287700d49f56a80c1498e26590c150b2ee4fd4dc442e9ef6e062c0dd3e0e6b941a1a0840b8874d003