Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
3a0078cfdffc1503d299e7a77894a7c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a0078cfdffc1503d299e7a77894a7c3.exe
Resource
win10v2004-20231222-en
General
-
Target
3a0078cfdffc1503d299e7a77894a7c3.exe
-
Size
385KB
-
MD5
3a0078cfdffc1503d299e7a77894a7c3
-
SHA1
2ce1447c19fee14c1dd93fa170978594694acc6f
-
SHA256
548c291a5bd5b4dabb0689d1a94d7072db78b566e709feaefce54965d6fd279d
-
SHA512
42f5020966a60f7d699b2c0de84e0d06b74305d885dad712078a354d6e7b728b17601a137ca0ccb019efe22e48b3ea1ca44a39d60c494673adc0fabfdb227c88
-
SSDEEP
12288:zcOpzegBKhryn2SmwRcEWvSX14D9lIJspYB:zcSagwBynFmYDVoYB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 3a0078cfdffc1503d299e7a77894a7c3.exe -
Executes dropped EXE 1 IoCs
pid Process 2112 3a0078cfdffc1503d299e7a77894a7c3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3560 3a0078cfdffc1503d299e7a77894a7c3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3560 3a0078cfdffc1503d299e7a77894a7c3.exe 2112 3a0078cfdffc1503d299e7a77894a7c3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 2112 3560 3a0078cfdffc1503d299e7a77894a7c3.exe 88 PID 3560 wrote to memory of 2112 3560 3a0078cfdffc1503d299e7a77894a7c3.exe 88 PID 3560 wrote to memory of 2112 3560 3a0078cfdffc1503d299e7a77894a7c3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a0078cfdffc1503d299e7a77894a7c3.exe"C:\Users\Admin\AppData\Local\Temp\3a0078cfdffc1503d299e7a77894a7c3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\3a0078cfdffc1503d299e7a77894a7c3.exeC:\Users\Admin\AppData\Local\Temp\3a0078cfdffc1503d299e7a77894a7c3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5f65021a577563d3ed57085e94543398a
SHA1060fb668a077036a24f843c91a96c8a37faea62a
SHA256c4fa1230e92eac0b15adb1582bc85da3aaf11e5fd53106c1bedd584686225288
SHA512a73949e062ab30a62f4c383959159fe2befba945e44355bb8e0e83194ddd1fc09baf224a9e494f84798f9fcb47bed2056d6bdbf933ad35f8097c2274e0bcfc93