Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
3a021d75a302de3fa1c5ac2300a44728.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a021d75a302de3fa1c5ac2300a44728.exe
Resource
win10v2004-20231215-en
General
-
Target
3a021d75a302de3fa1c5ac2300a44728.exe
-
Size
105KB
-
MD5
3a021d75a302de3fa1c5ac2300a44728
-
SHA1
e63be4b07aa2d222efac3ecd4d81d61f2f1ab4ea
-
SHA256
7e8cb9ef43368eddaa917474089b5dc864fa8e59730ec9f95fe7ec48d79d13e8
-
SHA512
6ea5692600057435d7a78e778790f9fa3389588017b63d933e6ad219541e1489102bc4b37543cb53a99f1684cff6ef42691e23f099c2ba86e8d5b1962219738f
-
SSDEEP
1536:TSq5yMgNZmtPSJQmz9LRNSOwpWfDpsuGSjhFicChoDV69jciZMUiTt6DtW9YH:eHp7mtjURIOwSpvGuhgYEjci3pW9i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 3a021d75a302de3fa1c5ac2300a44728.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 3a021d75a302de3fa1c5ac2300a44728.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2984 3a021d75a302de3fa1c5ac2300a44728.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2984 3a021d75a302de3fa1c5ac2300a44728.exe 2516 3a021d75a302de3fa1c5ac2300a44728.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2516 2984 3a021d75a302de3fa1c5ac2300a44728.exe 90 PID 2984 wrote to memory of 2516 2984 3a021d75a302de3fa1c5ac2300a44728.exe 90 PID 2984 wrote to memory of 2516 2984 3a021d75a302de3fa1c5ac2300a44728.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a021d75a302de3fa1c5ac2300a44728.exe"C:\Users\Admin\AppData\Local\Temp\3a021d75a302de3fa1c5ac2300a44728.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3a021d75a302de3fa1c5ac2300a44728.exeC:\Users\Admin\AppData\Local\Temp\3a021d75a302de3fa1c5ac2300a44728.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD57f30060a32f3b99771e1d578fa40a8fa
SHA1e780a3f53ce5a38bd82c4f0db69e522be15ee80b
SHA256fda6ee23444a9e3e04d3a1de5e29179d8fde0ea417e80387717c8a19e9ba4118
SHA512700cc0625a7972ed0208954ee85f26d6665ec94343b30e9cfed2ecb0404b0c85f373ed9835c97415050664c4bd475ecda8cad6ee58e30c4ee48fb5b53d93dc0d