Analysis
-
max time kernel
3s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 15:46
Behavioral task
behavioral1
Sample
3a3d8d1b94d0bd4127b5f8afd324b7a2.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a3d8d1b94d0bd4127b5f8afd324b7a2.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
3a3d8d1b94d0bd4127b5f8afd324b7a2.exe
-
Size
302KB
-
MD5
3a3d8d1b94d0bd4127b5f8afd324b7a2
-
SHA1
816899f0045ebc06699351bf0b36e1750e7da917
-
SHA256
eb6d1bcaa2a0b95620210d88237e9a3587d25266189ba0c7aef1583652d78dc1
-
SHA512
aead5550e30d9efd9c0bc5c4b2897720f734581bdf4efd4afbcad28dbc15ce15b254785ee3ba91b4d684abee752d21750e89ce124079ba07b7045e76a9b000d4
-
SSDEEP
6144:vA5CBOAEHRemW7KUKvWQ4FHxJx4nDfkmQ:IwB5ErW7PgOvoDcm
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe -
Loads dropped DLL 1 IoCs
pid Process 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe -
resource yara_rule behavioral1/files/0x000b000000014534-11.dat upx behavioral1/memory/2980-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe 2376 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2376 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe 16 PID 2980 wrote to memory of 2376 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe 16 PID 2980 wrote to memory of 2376 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe 16 PID 2980 wrote to memory of 2376 2980 3a3d8d1b94d0bd4127b5f8afd324b7a2.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3d8d1b94d0bd4127b5f8afd324b7a2.exe"C:\Users\Admin\AppData\Local\Temp\3a3d8d1b94d0bd4127b5f8afd324b7a2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\3a3d8d1b94d0bd4127b5f8afd324b7a2.exeC:\Users\Admin\AppData\Local\Temp\3a3d8d1b94d0bd4127b5f8afd324b7a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2376
-