Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
3d6fd3135c682defc6d28b92df398728.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d6fd3135c682defc6d28b92df398728.exe
Resource
win10v2004-20231215-en
General
-
Target
3d6fd3135c682defc6d28b92df398728.exe
-
Size
385KB
-
MD5
3d6fd3135c682defc6d28b92df398728
-
SHA1
62eeea18ceaf66d903bd3c8b187f2a423a2639f5
-
SHA256
c809a8b2992607f36e6ca9825b174d180db112b3b273d5861e910cc0d6e81fd7
-
SHA512
8d8e414ddad174bb089d9019aa32e115a19a55f998735f968b1e1c09c6671b46d7fb4ecc3f3538631372f70140f0c5063644d000e0bb02f40309c81c4095e6ca
-
SSDEEP
6144:4/C8id89pibo8m+FVgSQ/gXUDXRDCNdROYOM5AKmbM3wbX+6KGxPxFovVLLKS/Nl:uZpii+UzB4dBubk6KGpxTS/7pB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 320 3d6fd3135c682defc6d28b92df398728.exe -
Executes dropped EXE 1 IoCs
pid Process 320 3d6fd3135c682defc6d28b92df398728.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3616 3d6fd3135c682defc6d28b92df398728.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3616 3d6fd3135c682defc6d28b92df398728.exe 320 3d6fd3135c682defc6d28b92df398728.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3616 wrote to memory of 320 3616 3d6fd3135c682defc6d28b92df398728.exe 89 PID 3616 wrote to memory of 320 3616 3d6fd3135c682defc6d28b92df398728.exe 89 PID 3616 wrote to memory of 320 3616 3d6fd3135c682defc6d28b92df398728.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d6fd3135c682defc6d28b92df398728.exe"C:\Users\Admin\AppData\Local\Temp\3d6fd3135c682defc6d28b92df398728.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\3d6fd3135c682defc6d28b92df398728.exeC:\Users\Admin\AppData\Local\Temp\3d6fd3135c682defc6d28b92df398728.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b74e94f66966f3759abcb9d0c6e02ffd
SHA1be77dc9b20d3aef2b24f3f9df8c1615bc2f347b0
SHA2569af4d7682a054921bd6e00f8ff93e7b78d2c66760d7342d7f933aabcbe07afec
SHA512b787ae60888b20e1a18edf4e214d126f64456ba9274e7d4f742d32177d90b8839be9062f6944b2fe1d12481b14ea7651cb4b600c534c4d6e51986a2cf9d4eed8