Analysis
-
max time kernel
162s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
3f5f80d370a55668caf6a68af95f0471.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f5f80d370a55668caf6a68af95f0471.exe
Resource
win10v2004-20231215-en
General
-
Target
3f5f80d370a55668caf6a68af95f0471.exe
-
Size
385KB
-
MD5
3f5f80d370a55668caf6a68af95f0471
-
SHA1
a787c563c294446a57de5c39c5c764c7be62585b
-
SHA256
d51c9be11befebe897fc06dd3c52d5173ecade50c0c496b6c6fef42b848cc5b5
-
SHA512
31ce2faea71caf01611162407a861f1b5672cf1aa8a27e8e691ca8c62801617c6d9f241e224b997df3c14756644ed66e0429f96e4089b16e36307ed4a7bfa529
-
SSDEEP
6144:7pBjxnjksKKjgBt3tiPQLH+qGd5SX115Fq/oEcjzDGB:7pBljBKUgBtdo81zFqHUGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4716 3f5f80d370a55668caf6a68af95f0471.exe -
Executes dropped EXE 1 IoCs
pid Process 4716 3f5f80d370a55668caf6a68af95f0471.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2396 3f5f80d370a55668caf6a68af95f0471.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2396 3f5f80d370a55668caf6a68af95f0471.exe 4716 3f5f80d370a55668caf6a68af95f0471.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4716 2396 3f5f80d370a55668caf6a68af95f0471.exe 90 PID 2396 wrote to memory of 4716 2396 3f5f80d370a55668caf6a68af95f0471.exe 90 PID 2396 wrote to memory of 4716 2396 3f5f80d370a55668caf6a68af95f0471.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f5f80d370a55668caf6a68af95f0471.exe"C:\Users\Admin\AppData\Local\Temp\3f5f80d370a55668caf6a68af95f0471.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3f5f80d370a55668caf6a68af95f0471.exeC:\Users\Admin\AppData\Local\Temp\3f5f80d370a55668caf6a68af95f0471.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5aac3e77f3a987d06e6aaa88fc5615d7f
SHA1c00bab8cbc6af0a38b3469b8f69a13837b51976d
SHA2563e13855698c4e5625405fd284f4bc576cd768280ec8e062a91352e8b94f0a3ca
SHA512d97fd0b06f79df5958ed7171bf1fc2fd546c63f2de150b0d8b2a1a506e711290c09446efa8e925eb871d6482e0352a40d43c271bbd582b43093a8c76ec5d3085