Analysis
-
max time kernel
150s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 18:38
Behavioral task
behavioral1
Sample
3ac3a8e6a40da030174b5ff7e9bd4629.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ac3a8e6a40da030174b5ff7e9bd4629.exe
Resource
win10v2004-20231215-en
General
-
Target
3ac3a8e6a40da030174b5ff7e9bd4629.exe
-
Size
5.8MB
-
MD5
3ac3a8e6a40da030174b5ff7e9bd4629
-
SHA1
6dfd83ee27aa79d2df598709e45a43dff932ba9a
-
SHA256
59d0b3c9143fa50ccb91b216610efaa1141ea64944d2ebec803489c86159f274
-
SHA512
3c4b37b1be3e418fd83a7ac91c631c883ce8ae4d8e45945206261e32db577fabb2c15ff84b4ea96840a3f6a7e2f56de6a2028bd9c5527f33b9678478725c6f98
-
SSDEEP
98304:lK6EKW9ln4i/5Agg3gnl/IVUs1jePsA36t8wSIeQFBkdpqdgg3gnl/IVUs1jePs:AJJ9tOgl/iBiPTVJRQPkd6gl/iBiP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3568 3ac3a8e6a40da030174b5ff7e9bd4629.exe -
Executes dropped EXE 1 IoCs
pid Process 3568 3ac3a8e6a40da030174b5ff7e9bd4629.exe -
resource yara_rule behavioral2/memory/3288-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000001e0ce-11.dat upx behavioral2/memory/3568-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3288 3ac3a8e6a40da030174b5ff7e9bd4629.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3288 3ac3a8e6a40da030174b5ff7e9bd4629.exe 3568 3ac3a8e6a40da030174b5ff7e9bd4629.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3288 wrote to memory of 3568 3288 3ac3a8e6a40da030174b5ff7e9bd4629.exe 93 PID 3288 wrote to memory of 3568 3288 3ac3a8e6a40da030174b5ff7e9bd4629.exe 93 PID 3288 wrote to memory of 3568 3288 3ac3a8e6a40da030174b5ff7e9bd4629.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ac3a8e6a40da030174b5ff7e9bd4629.exe"C:\Users\Admin\AppData\Local\Temp\3ac3a8e6a40da030174b5ff7e9bd4629.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\3ac3a8e6a40da030174b5ff7e9bd4629.exeC:\Users\Admin\AppData\Local\Temp\3ac3a8e6a40da030174b5ff7e9bd4629.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5c0621126f83dbc04fefa521520ec7613
SHA16e801209d1654d098889e40e1812c9b9643fa61b
SHA25681bd6246e5e748798d9f6e1dd913cdff82b479540de30c1baf75b12d40d93a14
SHA512f2048019b803597810efab42879f03f008c17f023561923ed3af44a1134d5602b7894aae019ff9b2d775ec9a6a7b16427819d44c0340b68a858a11a0585b4bc7