Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
3d235ec73a59048934de5d70785a4a2a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d235ec73a59048934de5d70785a4a2a.exe
Resource
win10v2004-20231215-en
General
-
Target
3d235ec73a59048934de5d70785a4a2a.exe
-
Size
1.6MB
-
MD5
3d235ec73a59048934de5d70785a4a2a
-
SHA1
6e6a9eacdec986107cfd5d303fd17e2fb9776c33
-
SHA256
f31d1c0335c3263ed81cb15630dde05ceb4ba2a792832558141c7ca0d8597a45
-
SHA512
5b4e105623484f437c5e687f6d2c2e8c60a11adb10840af6b6585c08280576472c56c626a0e4ec05d7f9e0588a8e21058f315ce52a97db8eceaa70cb2c52580c
-
SSDEEP
24576:g6mctJobSPgvHTsMVOZyL3hHV8PfPsS3zAnU7MW/vq7A6nIuaQjYV5HuPodZZODQ:xm/hvDtHV6BzUW3qc89+5eodMG26tMc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 3d235ec73a59048934de5d70785a4a2a.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 3d235ec73a59048934de5d70785a4a2a.exe -
Loads dropped DLL 1 IoCs
pid Process 2996 3d235ec73a59048934de5d70785a4a2a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2996 3d235ec73a59048934de5d70785a4a2a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2996 3d235ec73a59048934de5d70785a4a2a.exe 2708 3d235ec73a59048934de5d70785a4a2a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2708 2996 3d235ec73a59048934de5d70785a4a2a.exe 28 PID 2996 wrote to memory of 2708 2996 3d235ec73a59048934de5d70785a4a2a.exe 28 PID 2996 wrote to memory of 2708 2996 3d235ec73a59048934de5d70785a4a2a.exe 28 PID 2996 wrote to memory of 2708 2996 3d235ec73a59048934de5d70785a4a2a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d235ec73a59048934de5d70785a4a2a.exe"C:\Users\Admin\AppData\Local\Temp\3d235ec73a59048934de5d70785a4a2a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3d235ec73a59048934de5d70785a4a2a.exeC:\Users\Admin\AppData\Local\Temp\3d235ec73a59048934de5d70785a4a2a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897KB
MD59474e67325fb4b2be9ae8710972dc307
SHA11995a55dd14425809f709f94870a4993f364c0b4
SHA2562899fed42993e3169d42104b702f07bccc9caed8b4fdc1797d12f9766d6c17c3
SHA512e1a08bb2b60527bbd63c8352079e8be512bc4d6b220f5557f8b1d216d969b05a14a82606acb111da2597f446582c8720498309ad1cffd583dbbae64961b2bdff