Analysis
-
max time kernel
142s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 06:18
Behavioral task
behavioral1
Sample
3c1b3b26a6dfd172d8aca8d9ed718763.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c1b3b26a6dfd172d8aca8d9ed718763.exe
Resource
win10v2004-20231215-en
General
-
Target
3c1b3b26a6dfd172d8aca8d9ed718763.exe
-
Size
1.5MB
-
MD5
3c1b3b26a6dfd172d8aca8d9ed718763
-
SHA1
e1ed358505eb9a0d448ad1a1761570ea198a8a4e
-
SHA256
cacdbbc52562c78ec2c2e2125e7f7b074a573ce29a092c88cf57c82d2566733f
-
SHA512
fb0901cf0b2a9c0b5f34fc8414092a712f710fe38de5f51cea42d3258b88a7b72420a7174d1ed11ccfb78d45931f9304f9d9cc69d14ed8ef482134c5312ccef4
-
SSDEEP
24576:TD+2lqTWGMHs3aBksmPfMTBzd9s5GzdE7Xb08ALwbBq7bqp1WW:TD/l8yHs3akPMt6Gxmb3ALwFqaDW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 3c1b3b26a6dfd172d8aca8d9ed718763.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 3c1b3b26a6dfd172d8aca8d9ed718763.exe -
resource yara_rule behavioral2/memory/4540-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00050000000006e9-11.dat upx behavioral2/memory/2616-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4540 3c1b3b26a6dfd172d8aca8d9ed718763.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4540 3c1b3b26a6dfd172d8aca8d9ed718763.exe 2616 3c1b3b26a6dfd172d8aca8d9ed718763.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2616 4540 3c1b3b26a6dfd172d8aca8d9ed718763.exe 24 PID 4540 wrote to memory of 2616 4540 3c1b3b26a6dfd172d8aca8d9ed718763.exe 24 PID 4540 wrote to memory of 2616 4540 3c1b3b26a6dfd172d8aca8d9ed718763.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1b3b26a6dfd172d8aca8d9ed718763.exe"C:\Users\Admin\AppData\Local\Temp\3c1b3b26a6dfd172d8aca8d9ed718763.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\3c1b3b26a6dfd172d8aca8d9ed718763.exeC:\Users\Admin\AppData\Local\Temp\3c1b3b26a6dfd172d8aca8d9ed718763.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c272b9572c3e1d77f71e31c597ec1212
SHA1aafa4f7e80749cbfb61eb80e3680d729098bcb7c
SHA25606eefb2da20d4757060ffda225b101d53995f4d582cdebef6e9c76e3d5141083
SHA512db11e1a7d6058a38e3ae8999c4d080eff87953ade97924d44f8abc819e8c08185871b378d9ec547a8e5addafe75a2c59cdb1e815514313d9a0ed41bfccd58ada