Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
3b02a5cd38f020b16ad603c4a46792b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b02a5cd38f020b16ad603c4a46792b2.exe
Resource
win10v2004-20231222-en
General
-
Target
3b02a5cd38f020b16ad603c4a46792b2.exe
-
Size
1.9MB
-
MD5
3b02a5cd38f020b16ad603c4a46792b2
-
SHA1
8e2500c1fcd9ae55166dea44c776e916081f7d99
-
SHA256
d6ffe9cdb1d264a801d71d3be0ec5d3e32eefffc7786a03cc1fcba699dcd602e
-
SHA512
e147e9a3eafae8d369d233a4e5b223f101753c9313e9da9efdddd56a8920898d56df065843752f339e173fc445733a0663fb15f92b4453bad945a178e5e19846
-
SSDEEP
49152:Qoa1taC070dyCk1vesYDs2WDVERWMzEC+JLJ:Qoa1taC0OkxYDs2WBERpEC4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4788 5851.tmp -
Executes dropped EXE 1 IoCs
pid Process 4788 5851.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4788 4792 3b02a5cd38f020b16ad603c4a46792b2.exe 91 PID 4792 wrote to memory of 4788 4792 3b02a5cd38f020b16ad603c4a46792b2.exe 91 PID 4792 wrote to memory of 4788 4792 3b02a5cd38f020b16ad603c4a46792b2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b02a5cd38f020b16ad603c4a46792b2.exe"C:\Users\Admin\AppData\Local\Temp\3b02a5cd38f020b16ad603c4a46792b2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3b02a5cd38f020b16ad603c4a46792b2.exe 1E5FFDEE048B82FAB931DACA599F199FD2CC9F50733FD2B9FF2E56CA934D56074D436DEB716E943B57AD25FB3A229A4C4315844A71EC30D67E43ABF3F378E0CE2⤵
- Deletes itself
- Executes dropped EXE
PID:4788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD53c4a5b5ad56cfd86fc2acd0cbd59d679
SHA1aed3321892ea661e840787f7aa527d46420202b0
SHA25615bc2587d55fdb919ae8aee2484ea832b29d40040150af3b22d8068d71c18cf4
SHA51239d44e5a3bc6b39ff3187f2968e43b912fb411e85329f2f37c40bcbcc50ce94187bbce1bba25c245c28e32e40da97a66e33827af7c04e958fc59de423fda636e
-
Filesize
381KB
MD537996f3b75a7cc4fe71385cf910176c9
SHA1e3bc264d2ede822fdf32e6c3ecd561e0d37ee556
SHA256f55ff90399463bd4dcb9d25bc94564c540c3fa964b3ecaf2f33b5f3d6f5a18e2
SHA5124d90f33584fd8b1e1ad5686ccd3dadcd6f44d6d4f51990d899dbffc4dfdf1b56b779ddf562dc7f30a73e35e64b20928bdbb5a0bad82a9644506504f62c788fba