Analysis

  • max time kernel
    122s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2024 17:58

General

  • Target

    3ea29fe6207b21b8008d73582b5dc7b8.exe

  • Size

    82KB

  • MD5

    3ea29fe6207b21b8008d73582b5dc7b8

  • SHA1

    40f191847cbf5b398a464dec9fbc43baafc339ef

  • SHA256

    0b5531597bf7a7388872df9edbfbc99d47ab24e9e9622615b74ad577d1f1c3e8

  • SHA512

    f7f74ebc6e02150f6c835069665b2d3ed9ae47c99e8e36c397954a0faef80e2f3068076f61fbada3db3d2678cb2e76656bb1c33d8945de7fea999e587413350b

  • SSDEEP

    1536:ciG16tFzwPb2SBlt8188hbmcR25dH4CQ3axzSgdnLRXGKe4xmwV0q0GYG:cX6tFD08q8hPQ5ZQKxmgdndWpev0Gz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea29fe6207b21b8008d73582b5dc7b8.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea29fe6207b21b8008d73582b5dc7b8.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Users\Admin\AppData\Local\Temp\3ea29fe6207b21b8008d73582b5dc7b8.exe
      C:\Users\Admin\AppData\Local\Temp\3ea29fe6207b21b8008d73582b5dc7b8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3ea29fe6207b21b8008d73582b5dc7b8.exe

    Filesize

    82KB

    MD5

    1a7f967f3af646385bdc8661a91afd2c

    SHA1

    c4ce1b229024cd00775c9b92fb3af76ed79ca6a2

    SHA256

    f20852bf0761daa629beffe38394625105227637817dedccd45a56a9ccca9835

    SHA512

    312b95d859dd8c93bfe9fbbabf6145f87f846970a611f5a02ab4aa2ea6c4265ef5cadfc552a0acc0c29772c9895f00647b3f68446285648ddb61aa3d286c3b4a

  • memory/2684-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2684-16-0x00000000001B0000-0x00000000001DF000-memory.dmp

    Filesize

    188KB

  • memory/2684-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2684-25-0x00000000014E0000-0x00000000014FB000-memory.dmp

    Filesize

    108KB

  • memory/4312-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4312-1-0x00000000001D0000-0x00000000001FF000-memory.dmp

    Filesize

    188KB

  • memory/4312-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4312-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB