Analysis
-
max time kernel
172s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
3ee18959fed35f7d5fb7814d324c24c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ee18959fed35f7d5fb7814d324c24c5.exe
Resource
win10v2004-20231215-en
General
-
Target
3ee18959fed35f7d5fb7814d324c24c5.exe
-
Size
771KB
-
MD5
3ee18959fed35f7d5fb7814d324c24c5
-
SHA1
eb39921a709211b76228238c323c61e4ff49fbd4
-
SHA256
245c901e0279e6e441bdd821e326151280697a2ce5fbcf0190347fd61d75b376
-
SHA512
4f165d3b6f4e4d2387603d81234a43eb28fd1578a62a8fe121d4440a0f204b969527e46850ee8ee7c999e7855af6a4787e1f1262734cbed401cc6e11ba59c07d
-
SSDEEP
24576:vJHGXv2gBfaiW/zsBbVb10hJaothZ2/T6FBBB:vpGXb05/iZ/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3496 3ee18959fed35f7d5fb7814d324c24c5.exe -
Executes dropped EXE 1 IoCs
pid Process 3496 3ee18959fed35f7d5fb7814d324c24c5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 3ee18959fed35f7d5fb7814d324c24c5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4876 3ee18959fed35f7d5fb7814d324c24c5.exe 3496 3ee18959fed35f7d5fb7814d324c24c5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3496 4876 3ee18959fed35f7d5fb7814d324c24c5.exe 95 PID 4876 wrote to memory of 3496 4876 3ee18959fed35f7d5fb7814d324c24c5.exe 95 PID 4876 wrote to memory of 3496 4876 3ee18959fed35f7d5fb7814d324c24c5.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe"C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exeC:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD511ea80fcfbdb14ef6c51f8d17bec9317
SHA122d621367fe0d9fcb8f9aa427feac8ae11d8b703
SHA2561d6f7284ac4acc48612efdf4d04e5c2a961021f650a1418c5c52d1ed9bbcf3ff
SHA51292fca4413f25720518db357bd0e2f6bfc0af3e109af0edef27f6170dfa7d38748bf543573a1e3adca8f102666938e0ad89d3bc4fa151a573cc457ebec8f22a30