Analysis
-
max time kernel
171s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 15:36
Behavioral task
behavioral1
Sample
3d3b1e51834b5479bf4d0efac434b8a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d3b1e51834b5479bf4d0efac434b8a4.exe
Resource
win10v2004-20231215-en
General
-
Target
3d3b1e51834b5479bf4d0efac434b8a4.exe
-
Size
1.5MB
-
MD5
3d3b1e51834b5479bf4d0efac434b8a4
-
SHA1
822ff2b282f2fe55d34e620feef5b8d57edbc46c
-
SHA256
81228dbae7982552e8d34dcc0f938bfb00b187a7593cebaf124ae4ba4a25c2c7
-
SHA512
c68822c4e3e6de164acc74455ee7624a1fcf58cef0cdf85798180ef7e0f2baf4be22e1bd1d6b81c23cc1cd4cba4a539cc52d10d44d0419718ecdcbc497415ee1
-
SSDEEP
24576:Ae0XCbaaHEiTLZoKWY80J3XnT9VQGVU0FqWjLk4P7v9H7MLW:QCmWvZ6I3DgGVUAAwe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4892 3d3b1e51834b5479bf4d0efac434b8a4.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 3d3b1e51834b5479bf4d0efac434b8a4.exe -
resource yara_rule behavioral2/memory/4840-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023204-11.dat upx behavioral2/memory/4892-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4840 3d3b1e51834b5479bf4d0efac434b8a4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4840 3d3b1e51834b5479bf4d0efac434b8a4.exe 4892 3d3b1e51834b5479bf4d0efac434b8a4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4892 4840 3d3b1e51834b5479bf4d0efac434b8a4.exe 90 PID 4840 wrote to memory of 4892 4840 3d3b1e51834b5479bf4d0efac434b8a4.exe 90 PID 4840 wrote to memory of 4892 4840 3d3b1e51834b5479bf4d0efac434b8a4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3b1e51834b5479bf4d0efac434b8a4.exe"C:\Users\Admin\AppData\Local\Temp\3d3b1e51834b5479bf4d0efac434b8a4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\3d3b1e51834b5479bf4d0efac434b8a4.exeC:\Users\Admin\AppData\Local\Temp\3d3b1e51834b5479bf4d0efac434b8a4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD57e38909558ecddbba89a4d3b5a1280b9
SHA13e970402e720bffc08eda33bdc84327b8c06c1f7
SHA256e75049ab9bf1714ce5046dc15b4c2dba6148d1984204a6b5bbecafb041c97e45
SHA512f38dda78e64de3374fd95b125b502363f47988c8d5c3d229d46089cce00dbf01b5cf5b76dafa8fb67dc36bf90f54a2feff5607534cc44241a156abef7d77045a