Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 19:34
Behavioral task
behavioral1
Sample
3db24c316536c1b8773d80a3e0da3856.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3db24c316536c1b8773d80a3e0da3856.exe
Resource
win10v2004-20231215-en
General
-
Target
3db24c316536c1b8773d80a3e0da3856.exe
-
Size
1.3MB
-
MD5
3db24c316536c1b8773d80a3e0da3856
-
SHA1
13f42612949752a6209271b30cfbeef441400ecb
-
SHA256
177332e3dc012397e6e9fc2ac4798c8efe515eb4b6aecb76a24cc433688671cf
-
SHA512
50bb1748032f374984dfe00ab1d8c985f3425190a926391188e0b3536576cd938b02370c4c40c49e9a6741d948f0d8100989fae161912c658f8f3ed62d426daf
-
SSDEEP
24576:Tjngs233QOcs30RexGThumON90+TsocWYS28zMCILgMNzZrmeXOadJDFmWO:TQ3QG3AexGTunfsoMS28IjVX/dJAf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 3db24c316536c1b8773d80a3e0da3856.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 3db24c316536c1b8773d80a3e0da3856.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 3db24c316536c1b8773d80a3e0da3856.exe -
resource yara_rule behavioral1/memory/2936-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2936-14-0x00000000034A0000-0x000000000398F000-memory.dmp upx behavioral1/files/0x0009000000012203-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2936 3db24c316536c1b8773d80a3e0da3856.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2936 3db24c316536c1b8773d80a3e0da3856.exe 3052 3db24c316536c1b8773d80a3e0da3856.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3052 2936 3db24c316536c1b8773d80a3e0da3856.exe 17 PID 2936 wrote to memory of 3052 2936 3db24c316536c1b8773d80a3e0da3856.exe 17 PID 2936 wrote to memory of 3052 2936 3db24c316536c1b8773d80a3e0da3856.exe 17 PID 2936 wrote to memory of 3052 2936 3db24c316536c1b8773d80a3e0da3856.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db24c316536c1b8773d80a3e0da3856.exe"C:\Users\Admin\AppData\Local\Temp\3db24c316536c1b8773d80a3e0da3856.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3db24c316536c1b8773d80a3e0da3856.exeC:\Users\Admin\AppData\Local\Temp\3db24c316536c1b8773d80a3e0da3856.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54360431b131acd5ca80f93d079dad7ce
SHA1a250847641e996df3586a0a0aa687380ced6b92e
SHA2569270e10510aee7d7d0568b98c3607a4a42cfe187552997334d0032f6f0018947
SHA51289a1312f2ce6b1077cb9d18b74e7c256bb6e80383b6738892ed9bd9231fdb8ba0781e5ddbf7cab4ce619463f0edf03672c77dd975410c13cdc83fb8ba89978cd