Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
3e0f3ca6bdfc3900d990c37407ddfa3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e0f3ca6bdfc3900d990c37407ddfa3a.exe
Resource
win10v2004-20231222-en
General
-
Target
3e0f3ca6bdfc3900d990c37407ddfa3a.exe
-
Size
385KB
-
MD5
3e0f3ca6bdfc3900d990c37407ddfa3a
-
SHA1
313325dbd5d807ad8d2343e94abe827677801f1d
-
SHA256
a2b0e6d6e64a6d39207844f53f634bdeb4abcef4bebfecad190d7996248cd2bd
-
SHA512
5031f0af3b7225214fedc10ae371aa31a332af48294b08c0dcc34aca9ebb4c711224c1c9e4046e620564e5b47da89c74ad895b28960e1348d10209445bb8a45e
-
SSDEEP
12288:9WCSHJmemneyVkeHW3FUEVB+7zeDoRKkqWvRMAyCuQpKaRSJ03PdZmonZ1lEWLB:9WjEey+eHIqd7SnLWmAnAJ03PJZoWLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4448 3e0f3ca6bdfc3900d990c37407ddfa3a.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 3e0f3ca6bdfc3900d990c37407ddfa3a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2748 3e0f3ca6bdfc3900d990c37407ddfa3a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2748 3e0f3ca6bdfc3900d990c37407ddfa3a.exe 4448 3e0f3ca6bdfc3900d990c37407ddfa3a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4448 2748 3e0f3ca6bdfc3900d990c37407ddfa3a.exe 17 PID 2748 wrote to memory of 4448 2748 3e0f3ca6bdfc3900d990c37407ddfa3a.exe 17 PID 2748 wrote to memory of 4448 2748 3e0f3ca6bdfc3900d990c37407ddfa3a.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0f3ca6bdfc3900d990c37407ddfa3a.exe"C:\Users\Admin\AppData\Local\Temp\3e0f3ca6bdfc3900d990c37407ddfa3a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\3e0f3ca6bdfc3900d990c37407ddfa3a.exeC:\Users\Admin\AppData\Local\Temp\3e0f3ca6bdfc3900d990c37407ddfa3a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5802cf3741a7c136753da17a0c068f93d
SHA14a4b31db1b822bf26dea33e04aa3f56bb867468f
SHA256d9d1a4944471ee7d1e72ed756f4a6ed852c12112221a1a500c1f18e8e65348a0
SHA51203bc39b8ad97a540086c778b19753dff32296b9be0a5449b56b3cec414640be54c010524226092afd7d31bd2d73c15e2f32f3f030141f1d320c21a159a31f6d6