Analysis
-
max time kernel
175s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
3ea92dc8c855bc23da2e9e98a46abedc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ea92dc8c855bc23da2e9e98a46abedc.exe
Resource
win10v2004-20231215-en
General
-
Target
3ea92dc8c855bc23da2e9e98a46abedc.exe
-
Size
385KB
-
MD5
3ea92dc8c855bc23da2e9e98a46abedc
-
SHA1
83af7cf38b85422a1fbf03a60590dedc3ca3c6ca
-
SHA256
0e25b84e76d623752f8bb6e8aa16c1818e4979190dd41f8f13441668d7472502
-
SHA512
c5969d44b2aaf25dd6d97bc1ee6b53f37673184e95d2e6691521a3585a6f47ff45bb71376702230c9f16b9147f0b321aa3a0006cc882d799ae274c987e5420fc
-
SSDEEP
6144:y7wnqY2GaeyF/e4a4y6SvE6LeRB8NEi6rjLxnAd9farvmUzmB:y78qYLyFiH6iaRjFnGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 3ea92dc8c855bc23da2e9e98a46abedc.exe -
Executes dropped EXE 1 IoCs
pid Process 3292 3ea92dc8c855bc23da2e9e98a46abedc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2916 3ea92dc8c855bc23da2e9e98a46abedc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2916 3ea92dc8c855bc23da2e9e98a46abedc.exe 3292 3ea92dc8c855bc23da2e9e98a46abedc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3292 2916 3ea92dc8c855bc23da2e9e98a46abedc.exe 93 PID 2916 wrote to memory of 3292 2916 3ea92dc8c855bc23da2e9e98a46abedc.exe 93 PID 2916 wrote to memory of 3292 2916 3ea92dc8c855bc23da2e9e98a46abedc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ea92dc8c855bc23da2e9e98a46abedc.exe"C:\Users\Admin\AppData\Local\Temp\3ea92dc8c855bc23da2e9e98a46abedc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3ea92dc8c855bc23da2e9e98a46abedc.exeC:\Users\Admin\AppData\Local\Temp\3ea92dc8c855bc23da2e9e98a46abedc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b132cd3a2c08e08c100e98f326db7be6
SHA18779d8967f7c33438d0d309c44c8d5fd2a6ee2b4
SHA2563904960e0a9255be1ecb77267c6a5bc4190e27fbba82b80184c3152ce7eda3d1
SHA512f4a3079bf6a83135f8f665bd404e8e9f88aff40f7f50949f762213cc8e28f11a30c8e1a42fd25bea04110337f523a696bf8b8d1b76fe10ca19acfd9f82c28a7b