Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe
Resource
win10v2004-20231215-en
General
-
Target
3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe
-
Size
385KB
-
MD5
3f3ab5a1ef206c76fc9a84fa19aa7b8f
-
SHA1
6ff170d4e8c0e270b932c1568da9c84427cafc16
-
SHA256
82b9dc60b9330e67d2145151c59f2115c41cb3f2479ce4ed54f23f1bbe6f4f3d
-
SHA512
b96cb2a4ee7b86ddff787655142807306e7bb1102bdcdce776def23b5aeaac44d8af690e2f31fcbd23b51d997239f21fd07f180b322dfaa6ac8290c83418a7a9
-
SSDEEP
12288:z8OiD39miqm5eYVZvYp0xN+C6UNxpd935Ge6B:zyDZq6eQYON/6UlL35Ge6B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4552 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe -
Executes dropped EXE 1 IoCs
pid Process 4552 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3192 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3192 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe 4552 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4552 3192 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe 89 PID 3192 wrote to memory of 4552 3192 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe 89 PID 3192 wrote to memory of 4552 3192 3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe"C:\Users\Admin\AppData\Local\Temp\3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3f3ab5a1ef206c76fc9a84fa19aa7b8f.exeC:\Users\Admin\AppData\Local\Temp\3f3ab5a1ef206c76fc9a84fa19aa7b8f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52d5f2b890aac5af5b6628ad6c5a66268
SHA10cdc4c432f24293352d4b74bfc5469d57ae3f741
SHA256550bb4fdd166604c831bd9d061a11dc8cb199a6fc533aa7c791adb9f530a9c93
SHA5127b5818c77ea7328c0f2d5f6d024230d790f7bbba3f857d5e3bfbe776a6552cf8e8bd9cc9794715a2f7f3748e6eb4f36152200ee70c6bc04d9beab7d1b9fd3491