Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
3c9d0962009ac99af72bfd05c63920dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c9d0962009ac99af72bfd05c63920dc.exe
Resource
win10v2004-20231222-en
General
-
Target
3c9d0962009ac99af72bfd05c63920dc.exe
-
Size
1.9MB
-
MD5
3c9d0962009ac99af72bfd05c63920dc
-
SHA1
0bbaa470c67e47069c8d46cdafc8cf745f0e695c
-
SHA256
481d04d41efabb5efe74bb854af81984a3e0f3da2e091ac5fdaa27758bf63c25
-
SHA512
ee79b4337380517fb6abd3b8ffc3ea67dfad8afde14a4b7e673d372e25633d3668fefcc58711d4088fd09dabdb97eb67415b6b858744266cfce06fba58d66d17
-
SSDEEP
49152:Qoa1taC070dwgk5bWAfbpKTdiQocdjkBK:Qoa1taC0t5ySpAUE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 865F.tmp -
Executes dropped EXE 1 IoCs
pid Process 2616 865F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2912 3c9d0962009ac99af72bfd05c63920dc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2616 2912 3c9d0962009ac99af72bfd05c63920dc.exe 28 PID 2912 wrote to memory of 2616 2912 3c9d0962009ac99af72bfd05c63920dc.exe 28 PID 2912 wrote to memory of 2616 2912 3c9d0962009ac99af72bfd05c63920dc.exe 28 PID 2912 wrote to memory of 2616 2912 3c9d0962009ac99af72bfd05c63920dc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c9d0962009ac99af72bfd05c63920dc.exe"C:\Users\Admin\AppData\Local\Temp\3c9d0962009ac99af72bfd05c63920dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\865F.tmp"C:\Users\Admin\AppData\Local\Temp\865F.tmp" --splashC:\Users\Admin\AppData\Local\Temp\3c9d0962009ac99af72bfd05c63920dc.exe 5E387AD593346FBFAFB2DB468AC92A9A88CDB4B7F647D9E8F4E8F0BC592EBBA9CBE29C6E253651889F9647821D08105D34502CB3C7B3C6D4074809BD0B8025A72⤵
- Deletes itself
- Executes dropped EXE
PID:2616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d18f64cecfc27ffa72f15baf3a6a0ad9
SHA1f219f76acb11a81d1cb404816c14347ef44be53a
SHA256e4293af1276acd41cc34af8bb130527c484e3e5333fd0d70ecd21b900337f1b2
SHA512ea45aa4b71dc584fcc371773a51fca7b01e2690ef2df8843f4768ec4dd3c9a51811ff310eedeafb7583df0895d0aad4416968230a172e25d9f3e3e8df21ce9f7