Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 09:10
Behavioral task
behavioral1
Sample
3c7616a08c13c089bad2eb9bf26c46eb.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c7616a08c13c089bad2eb9bf26c46eb.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3c7616a08c13c089bad2eb9bf26c46eb.exe
-
Size
2.9MB
-
MD5
3c7616a08c13c089bad2eb9bf26c46eb
-
SHA1
205a7e546f1ab1c49be233bfc2156f6a5f5ad992
-
SHA256
4d3bd6e6fc911e0d1efd050b20c25e70125e3bdd76a704c42f4e3bcf69c58ace
-
SHA512
bd4d3e7b0a22a0bbf5c23cb1bddf1a10874516365869caa5fd32077d2a7b1ddcbd54e352b402a58eb03da8fd641387b76c5edede047d85a7e92d88e16ce0a1bd
-
SSDEEP
49152:OkqB0KaRzY2K6BM5gaBqSvi0RXoN74NH5HUyNRcUsCVOzetdZJ:2B0RtKFgaBqPGo4HBUCczzM3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1440 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Executes dropped EXE 1 IoCs
pid Process 1440 3c7616a08c13c089bad2eb9bf26c46eb.exe -
resource yara_rule behavioral2/memory/2104-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1440-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 3c7616a08c13c089bad2eb9bf26c46eb.exe 1440 3c7616a08c13c089bad2eb9bf26c46eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1440 2104 3c7616a08c13c089bad2eb9bf26c46eb.exe 20 PID 2104 wrote to memory of 1440 2104 3c7616a08c13c089bad2eb9bf26c46eb.exe 20 PID 2104 wrote to memory of 1440 2104 3c7616a08c13c089bad2eb9bf26c46eb.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe"C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exeC:\Users\Admin\AppData\Local\Temp\3c7616a08c13c089bad2eb9bf26c46eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1440
-