Analysis
-
max time kernel
164s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
Resource
win10v2004-20231215-en
General
-
Target
3e4e0d26ae3ef7cb025c25fdd1487c1f.exe
-
Size
385KB
-
MD5
3e4e0d26ae3ef7cb025c25fdd1487c1f
-
SHA1
4150123da79c3683b4a4ba1baf91c6c4b269242a
-
SHA256
99ae204a3285be5305d2fd9d359495ca3d68d515f5ee0514bd388801ef1d0402
-
SHA512
1bf1d47d827912bb4ba8405c5f07e67daf6079ed9b8ebd308fc6dce416977626154fd57ed9885a80643581ed85d8a3ce84a7496907a4bbc14e6182e507fce2e4
-
SSDEEP
12288:0YT6Bh8BtpRzJsUfd0CNFGKDID588c7ZJc7lbMB:0Y6h8BMu1ClDJct0MB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5084 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5084 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe 4900 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4900 5084 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe 94 PID 5084 wrote to memory of 4900 5084 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe 94 PID 5084 wrote to memory of 4900 5084 3e4e0d26ae3ef7cb025c25fdd1487c1f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe"C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exeC:\Users\Admin\AppData\Local\Temp\3e4e0d26ae3ef7cb025c25fdd1487c1f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD550679034e7cb9edb1c3af4031406715a
SHA1ad9aff15375ef9a0035e1ffd80b7f34bea259f32
SHA256dfd134977fc420e85356fb5dcb118a4b4fad9a500769f071121da7f20eeb716f
SHA512af24960754d14e3262ba146aab6f05f8ca44782225d6b8c80d97466ad358a9bd2fcb6058a8e86307792989faa61357db66c3f659fc2f94d6de7d519a3b23ee67