Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
3f163a6401eadd11f42fa74267a5957f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f163a6401eadd11f42fa74267a5957f.exe
Resource
win10v2004-20231215-en
General
-
Target
3f163a6401eadd11f42fa74267a5957f.exe
-
Size
82KB
-
MD5
3f163a6401eadd11f42fa74267a5957f
-
SHA1
68dea358f78da13127df7e41969060dc3c741bc1
-
SHA256
18f1ec5b391181be3b7254e4fdf47e3b11a335aa866a8aed72ad4ac5cfd6c35f
-
SHA512
2d746d679ee0a9b07334a0e355cbb9a15b63cc4801b3235c31516b576367f7ffc4bd3c8e79921afb60aacec1b8fb4f586567977f9fb213da67d173ea36232233
-
SSDEEP
1536:vKgHB8/XNuxIAQLg1IuFmdSOA62pRNXUdrQtFp:vsNuTQHbdSOATNEBQtFp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4176 3f163a6401eadd11f42fa74267a5957f.exe -
Executes dropped EXE 1 IoCs
pid Process 4176 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1848 3f163a6401eadd11f42fa74267a5957f.exe 4176 3f163a6401eadd11f42fa74267a5957f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4176 1848 3f163a6401eadd11f42fa74267a5957f.exe 90 PID 1848 wrote to memory of 4176 1848 3f163a6401eadd11f42fa74267a5957f.exe 90 PID 1848 wrote to memory of 4176 1848 3f163a6401eadd11f42fa74267a5957f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe"C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exeC:\Users\Admin\AppData\Local\Temp\3f163a6401eadd11f42fa74267a5957f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5c1f534dd3c9d62c4d48be9e8c41711f5
SHA1106376d99a90139d3377d3b6ad8c945a29662614
SHA2562741538cd0793eed8df82f71e7558fec6ca294960c8cbb044515a3f2a0e40528
SHA512a37c60c2e66dec5c19fa6ce97453fe8af741ea0ee8e3de113b05399383fb4c1a9e78f3812c9c6a5818a06bd1cc3404d36b32a2d89af46acb8babd1c3258c9dcf