Analysis
-
max time kernel
123s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:35
Behavioral task
behavioral1
Sample
3a01d27b192b15151b61851a338bedd9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a01d27b192b15151b61851a338bedd9.exe
Resource
win10v2004-20231215-en
General
-
Target
3a01d27b192b15151b61851a338bedd9.exe
-
Size
5.3MB
-
MD5
3a01d27b192b15151b61851a338bedd9
-
SHA1
c424eb34473abce9db6831c2d06aa54d370a3054
-
SHA256
ad717cbc92dba90d38aba4967430001633920e8ec6f3e55e2eaf82e00b415081
-
SHA512
a7622c9e0d3d8f0f96ed2e2ccd5b0d650a8f7d206b68916d013793d51e2a3fabd595470bab12daa2dd4af138bca7c78f30cfabc1106dc3133e7f558975c55533
-
SSDEEP
98304:YXW7+ksL6TNjb7W/FjEFzw9oPdCGAQOd7IwgyhFjEFzw9oP:yWM6TNvuFIFEWCG+KyFIFE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1508 3a01d27b192b15151b61851a338bedd9.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 3a01d27b192b15151b61851a338bedd9.exe -
Loads dropped DLL 1 IoCs
pid Process 2956 3a01d27b192b15151b61851a338bedd9.exe -
resource yara_rule behavioral1/memory/2956-1-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral1/files/0x001000000000b1f5-11.dat upx behavioral1/files/0x001000000000b1f5-14.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2956 3a01d27b192b15151b61851a338bedd9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2956 3a01d27b192b15151b61851a338bedd9.exe 1508 3a01d27b192b15151b61851a338bedd9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1508 2956 3a01d27b192b15151b61851a338bedd9.exe 29 PID 2956 wrote to memory of 1508 2956 3a01d27b192b15151b61851a338bedd9.exe 29 PID 2956 wrote to memory of 1508 2956 3a01d27b192b15151b61851a338bedd9.exe 29 PID 2956 wrote to memory of 1508 2956 3a01d27b192b15151b61851a338bedd9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a01d27b192b15151b61851a338bedd9.exe"C:\Users\Admin\AppData\Local\Temp\3a01d27b192b15151b61851a338bedd9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3a01d27b192b15151b61851a338bedd9.exeC:\Users\Admin\AppData\Local\Temp\3a01d27b192b15151b61851a338bedd9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
563KB
MD5c310bc1236f39c1abddb1dfe9ee692e4
SHA17929797200e03c105dc28dd14eb2ef7f39aef20e
SHA2563effe7fdafd0f11b850e3f547b8a63e3f42746a18d670959e6d4ab7a0aaf1564
SHA5124c1c886a7414d5287bed2568550de4268dfffefa4a3946acb701b12eb41871fc0a7fedfc1bb3df43bf02b54881264bc79a3064be38515cfa6585be214d34cf74
-
Filesize
496KB
MD575ee2cb57b38ff6a05ec33eb6b42569e
SHA1cbc70005204da049734204f456224761dc187b71
SHA25666cf7dfe72d05b9497a875656504ea9e3b3a37df2166e8186f8e79526fec2be6
SHA512c00fabd300776cea89f41e1c5e9e366c765cbbca43c3d07e808be2d539ccb4b6d0df6f052ec86275cec62e3bd77dd5d64fb2ef64ef0ea8db32576feaba756608