Analysis

  • max time kernel
    164s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2024 00:52

General

  • Target

    3e4e0d26ae3ef7cb025c25fdd1487c1f.exe

  • Size

    385KB

  • MD5

    3e4e0d26ae3ef7cb025c25fdd1487c1f

  • SHA1

    4150123da79c3683b4a4ba1baf91c6c4b269242a

  • SHA256

    99ae204a3285be5305d2fd9d359495ca3d68d515f5ee0514bd388801ef1d0402

  • SHA512

    1bf1d47d827912bb4ba8405c5f07e67daf6079ed9b8ebd308fc6dce416977626154fd57ed9885a80643581ed85d8a3ce84a7496907a4bbc14e6182e507fce2e4

  • SSDEEP

    12288:0YT6Bh8BtpRzJsUfd0CNFGKDID588c7ZJc7lbMB:0Y6h8BMu1ClDJct0MB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
    "C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
      C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe

    Filesize

    385KB

    MD5

    50679034e7cb9edb1c3af4031406715a

    SHA1

    ad9aff15375ef9a0035e1ffd80b7f34bea259f32

    SHA256

    dfd134977fc420e85356fb5dcb118a4b4fad9a500769f071121da7f20eeb716f

    SHA512

    af24960754d14e3262ba146aab6f05f8ca44782225d6b8c80d97466ad358a9bd2fcb6058a8e86307792989faa61357db66c3f659fc2f94d6de7d519a3b23ee67

  • memory/4900-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4900-15-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4900-20-0x0000000001630000-0x000000000168F000-memory.dmp

    Filesize

    380KB

  • memory/4900-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4900-31-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/4900-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4900-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/5084-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/5084-1-0x0000000001610000-0x0000000001676000-memory.dmp

    Filesize

    408KB

  • memory/5084-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/5084-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB