Analysis
-
max time kernel
155s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
3db077694e62e354d060fa2aace5cf49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3db077694e62e354d060fa2aace5cf49.exe
Resource
win10v2004-20231215-en
General
-
Target
3db077694e62e354d060fa2aace5cf49.exe
-
Size
84KB
-
MD5
3db077694e62e354d060fa2aace5cf49
-
SHA1
ad3b22af5a47ff566b337ab7989dbd2b50334804
-
SHA256
282d1f96d583c1b04327d61425645e3a5a9352ebbce006a768079b93785d5be4
-
SHA512
2f5382080054c4947f31c13378d6346c47e35b6a522963141f3d5cf102d70b96dae4fc65cf844afd12bd6cbdfe86713a24e0867397c1d719c211eda88cf040b2
-
SSDEEP
1536:cLo0Q1Q96lZwEJk4twvlQDh3dgKGzK8nqu7OijCvBZmvmdF+GWBeN+P:cLo0Q1U6FniQDhtBpW16YIosF+JT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1212 3db077694e62e354d060fa2aace5cf49.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4964 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4964 3db077694e62e354d060fa2aace5cf49.exe 1212 3db077694e62e354d060fa2aace5cf49.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1212 4964 3db077694e62e354d060fa2aace5cf49.exe 87 PID 4964 wrote to memory of 1212 4964 3db077694e62e354d060fa2aace5cf49.exe 87 PID 4964 wrote to memory of 1212 4964 3db077694e62e354d060fa2aace5cf49.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe"C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exeC:\Users\Admin\AppData\Local\Temp\3db077694e62e354d060fa2aace5cf49.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5743954ee253e1601a3d3486edb65bf91
SHA1a585bf945fe5eba63c63c24fdeb12f0cb1e6a01f
SHA256806b9e8cd7819c3012d86eba2d8f1b0fec280df5cbd6075aabaea07ef6361fbb
SHA512c0e48154050550c271d8f7d8bfbda7769473a7f31b8ec5aecf579e6e8e3400aa5d375534dd59fb3ee6a98fbf98442b579259961a26e2293333240b8bcfe4206d