Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2024 21:37

General

  • Target

    3f163a6401eadd11f42fa74267a5957f.exe

  • Size

    82KB

  • MD5

    3f163a6401eadd11f42fa74267a5957f

  • SHA1

    68dea358f78da13127df7e41969060dc3c741bc1

  • SHA256

    18f1ec5b391181be3b7254e4fdf47e3b11a335aa866a8aed72ad4ac5cfd6c35f

  • SHA512

    2d746d679ee0a9b07334a0e355cbb9a15b63cc4801b3235c31516b576367f7ffc4bd3c8e79921afb60aacec1b8fb4f586567977f9fb213da67d173ea36232233

  • SSDEEP

    1536:vKgHB8/XNuxIAQLg1IuFmdSOA62pRNXUdrQtFp:vsNuTQHbdSOATNEBQtFp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe
    "C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe
      C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe

    Filesize

    82KB

    MD5

    c1f534dd3c9d62c4d48be9e8c41711f5

    SHA1

    106376d99a90139d3377d3b6ad8c945a29662614

    SHA256

    2741538cd0793eed8df82f71e7558fec6ca294960c8cbb044515a3f2a0e40528

    SHA512

    a37c60c2e66dec5c19fa6ce97453fe8af741ea0ee8e3de113b05399383fb4c1a9e78f3812c9c6a5818a06bd1cc3404d36b32a2d89af46acb8babd1c3258c9dcf

  • memory/1848-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1848-1-0x00000000001D0000-0x00000000001FF000-memory.dmp

    Filesize

    188KB

  • memory/1848-2-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1848-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4176-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4176-15-0x00000000000E0000-0x000000000010F000-memory.dmp

    Filesize

    188KB

  • memory/4176-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4176-25-0x00000000014F0000-0x000000000150B000-memory.dmp

    Filesize

    108KB