Analysis
-
max time kernel
3s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
3c5d6798eb37526539867d28ae94e32d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c5d6798eb37526539867d28ae94e32d.exe
Resource
win10v2004-20231222-en
General
-
Target
3c5d6798eb37526539867d28ae94e32d.exe
-
Size
907KB
-
MD5
3c5d6798eb37526539867d28ae94e32d
-
SHA1
08d077128cd1f09675da34eec4c6ad682fe22e60
-
SHA256
a7f48f6bd93f2fb39c5bbdbf97d426b9fffdcfeeb4c3a27e97478ce999911ec3
-
SHA512
732c24560ca991a49921ddadb2761ba38aa11e604c8646dc0280a3ab580244b2f4f8da6e99b042b3105f6fa0b4499401ce8438c0dbd6d78bc889306c979b78f4
-
SSDEEP
24576:2xH2RrBOwsBriadXQGKuJDUtr31GRNBRa/ZS1:2d8OwurDQ6DUtbkngS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2424 3c5d6798eb37526539867d28ae94e32d.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 3c5d6798eb37526539867d28ae94e32d.exe -
Loads dropped DLL 1 IoCs
pid Process 1544 3c5d6798eb37526539867d28ae94e32d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1544 3c5d6798eb37526539867d28ae94e32d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1544 3c5d6798eb37526539867d28ae94e32d.exe 2424 3c5d6798eb37526539867d28ae94e32d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2424 1544 3c5d6798eb37526539867d28ae94e32d.exe 20 PID 1544 wrote to memory of 2424 1544 3c5d6798eb37526539867d28ae94e32d.exe 20 PID 1544 wrote to memory of 2424 1544 3c5d6798eb37526539867d28ae94e32d.exe 20 PID 1544 wrote to memory of 2424 1544 3c5d6798eb37526539867d28ae94e32d.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c5d6798eb37526539867d28ae94e32d.exe"C:\Users\Admin\AppData\Local\Temp\3c5d6798eb37526539867d28ae94e32d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3c5d6798eb37526539867d28ae94e32d.exeC:\Users\Admin\AppData\Local\Temp\3c5d6798eb37526539867d28ae94e32d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD59defe6036bde8d5dbe4900ef26f7f119
SHA1f625315d8ba32334f0a4e0d5e766a7b94052f6fe
SHA25612f312d2b95bfc4df84c9667a31fd651200335401a1616458fb5e1af8b0e17e3
SHA51247573e7dd7232632c6c9cbc6851eed1f121254ad824c35114886260b4fea23583612304f0637a08682ba08fd639281b9ee55cfe80b6d804093cea4568c00c7ab
-
Filesize
49KB
MD52654e9b349af99934ad4ec5dea304e0d
SHA11d32375205ab82ff5faf8c375db8fb0fedd74abf
SHA2563a70f3a8dae7d3fe27cfb3d4d9d8601595a64d2b31128b16ebf023910090b88a
SHA51219c15505135e11c95b1a16c8da6c000013afad598d4e52379ead16faee9a27dfb3dc944672483a9fd89966e45129a77a2da1add98a39d9927479ce83cc24cb13
-
Filesize
57KB
MD53d77a51351bbbbfbed455f36c5c90cb1
SHA1e70333868e2e8fbfe6ac21fb0b2f018cfb6659e9
SHA25628772b467416a90067ad2c78689f75660e05799716a3e2eb4328348a8f4c16c0
SHA5129dc1219b810b2547a648356e1a3137e693afcda7f68ffb7213e1d71d8845c320b0b7964854a35383d9ffea83eed3211e98fbd7caf2b5dfec3b3383048332679b
-
Filesize
5KB
MD5a5259e2aed326a1568c7c32d991fb0e7
SHA1dcf28710beb52beca64fd5204071852541084acb
SHA25690a9c2da5f42d0b4cbdd903536dd786d10ae93cc9be6c711b496c68f63be691d
SHA5120d8eda6727e155a5243c71ee364d69bb0ae442c056da09920c61fa3f83ee35760f9c0b6724c864e39ec425663ceb1c454ea8ea7d97824541fd3eccd87fff5f5a