Analysis

  • max time kernel
    172s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 19:28

General

  • Target

    3ee18959fed35f7d5fb7814d324c24c5.exe

  • Size

    771KB

  • MD5

    3ee18959fed35f7d5fb7814d324c24c5

  • SHA1

    eb39921a709211b76228238c323c61e4ff49fbd4

  • SHA256

    245c901e0279e6e441bdd821e326151280697a2ce5fbcf0190347fd61d75b376

  • SHA512

    4f165d3b6f4e4d2387603d81234a43eb28fd1578a62a8fe121d4440a0f204b969527e46850ee8ee7c999e7855af6a4787e1f1262734cbed401cc6e11ba59c07d

  • SSDEEP

    24576:vJHGXv2gBfaiW/zsBbVb10hJaothZ2/T6FBBB:vpGXb05/iZ/ofT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe
    "C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe
      C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3ee18959fed35f7d5fb7814d324c24c5.exe

          Filesize

          771KB

          MD5

          11ea80fcfbdb14ef6c51f8d17bec9317

          SHA1

          22d621367fe0d9fcb8f9aa427feac8ae11d8b703

          SHA256

          1d6f7284ac4acc48612efdf4d04e5c2a961021f650a1418c5c52d1ed9bbcf3ff

          SHA512

          92fca4413f25720518db357bd0e2f6bfc0af3e109af0edef27f6170dfa7d38748bf543573a1e3adca8f102666938e0ad89d3bc4fa151a573cc457ebec8f22a30

        • memory/3496-13-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/3496-14-0x00000000015F0000-0x0000000001656000-memory.dmp

          Filesize

          408KB

        • memory/3496-20-0x0000000004EA0000-0x0000000004EFF000-memory.dmp

          Filesize

          380KB

        • memory/3496-21-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/3496-30-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3496-34-0x000000000B600000-0x000000000B63C000-memory.dmp

          Filesize

          240KB

        • memory/3496-36-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/4876-0-0x0000000000400000-0x0000000000466000-memory.dmp

          Filesize

          408KB

        • memory/4876-1-0x00000000014D0000-0x0000000001536000-memory.dmp

          Filesize

          408KB

        • memory/4876-2-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4876-12-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB