Analysis
-
max time kernel
3s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:37
Behavioral task
behavioral1
Sample
3a0d48b0a04608f932a0cdc59e81df6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a0d48b0a04608f932a0cdc59e81df6a.exe
Resource
win10v2004-20231222-en
General
-
Target
3a0d48b0a04608f932a0cdc59e81df6a.exe
-
Size
133KB
-
MD5
3a0d48b0a04608f932a0cdc59e81df6a
-
SHA1
17a68ee7a126d5c08577b37145fdbb5de8e2058a
-
SHA256
452c7d59d108c4ac8e99bca5add47409484899f906ab4a5d9ca64f8e3cf1aaca
-
SHA512
986ab9c3584ad129156270b61119fa73088206de82837e2c384c6a71b2a3dd2fe503d058f093a897b91a7b5c53c8029577b488ba33b16f709dad3029c1bdbb33
-
SSDEEP
3072:YRt9LpXh1pODnPxtaPEi7BShM+i2hwFkSCQ:Y/99h1pODfaPEmd+i2hwejQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 3a0d48b0a04608f932a0cdc59e81df6a.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 3a0d48b0a04608f932a0cdc59e81df6a.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe -
resource yara_rule behavioral1/memory/2500-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/files/0x00070000000122c9-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe 2688 3a0d48b0a04608f932a0cdc59e81df6a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2688 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe 14 PID 2500 wrote to memory of 2688 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe 14 PID 2500 wrote to memory of 2688 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe 14 PID 2500 wrote to memory of 2688 2500 3a0d48b0a04608f932a0cdc59e81df6a.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a0d48b0a04608f932a0cdc59e81df6a.exeC:\Users\Admin\AppData\Local\Temp\3a0d48b0a04608f932a0cdc59e81df6a.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3a0d48b0a04608f932a0cdc59e81df6a.exe"C:\Users\Admin\AppData\Local\Temp\3a0d48b0a04608f932a0cdc59e81df6a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5ac65978017c300484a828d11a0be596e
SHA1c7113d729ded7e7484334c9887e64bb9065b8725
SHA2560ea3cbf903187a9a1783d5064d27fb2c9a01c069f18f17409e8d4fcbfc3effa5
SHA512fb384733c3aeaa3ae79fe9a09c467c58efd0cdf4fb8098269289939ec44b3ebb6796a5f2cb6ae72b4fe3f99b1204c31547990d7f4534c15edba9c98b8aec461e