Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
393ff89b85ab8834cb666a73e1e0f3a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
393ff89b85ab8834cb666a73e1e0f3a3.exe
Resource
win10v2004-20231215-en
General
-
Target
393ff89b85ab8834cb666a73e1e0f3a3.exe
-
Size
82KB
-
MD5
393ff89b85ab8834cb666a73e1e0f3a3
-
SHA1
c76fd861525fbdebe8f5bf88c92a28d7816263be
-
SHA256
6f2d276808779db7d392114c36b7961f889388b2e3bcd6cd03e5593b40814c0d
-
SHA512
3a784fed217c5327dbc0a3994aa4645997c797c98a9402bca70ed227a271281eea0ddbca518bd9f47b736637a795b0a74b3f319c58c124b538722c371f1cddb4
-
SSDEEP
1536:0DUTSTSEuek3Oi7INqYXhMzzHma28CUT21dQou4MmF9sZAMHv:0z+b3Ot9ux2ZHqk9sZF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3840 393ff89b85ab8834cb666a73e1e0f3a3.exe -
Executes dropped EXE 1 IoCs
pid Process 3840 393ff89b85ab8834cb666a73e1e0f3a3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3272 393ff89b85ab8834cb666a73e1e0f3a3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3272 393ff89b85ab8834cb666a73e1e0f3a3.exe 3840 393ff89b85ab8834cb666a73e1e0f3a3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3840 3272 393ff89b85ab8834cb666a73e1e0f3a3.exe 92 PID 3272 wrote to memory of 3840 3272 393ff89b85ab8834cb666a73e1e0f3a3.exe 92 PID 3272 wrote to memory of 3840 3272 393ff89b85ab8834cb666a73e1e0f3a3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\393ff89b85ab8834cb666a73e1e0f3a3.exe"C:\Users\Admin\AppData\Local\Temp\393ff89b85ab8834cb666a73e1e0f3a3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\393ff89b85ab8834cb666a73e1e0f3a3.exeC:\Users\Admin\AppData\Local\Temp\393ff89b85ab8834cb666a73e1e0f3a3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5cc0d705961876391242aaa4c18f661fa
SHA162f3c5006bf7221adfdb2b820f7b322c6f6c8912
SHA256c1d95e17e6300a939e4885b66186b6aa7bb22456ad2d59958069a59eee13aefd
SHA5122c518ba7420627a4afcfa2f51c5290f8744db2d04ec565d7beb32bf937aefc12f2c180e7d27a942fad0ec92b7a316e263fcaa906014cb052ee8adabc9345201c