Analysis
-
max time kernel
4s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
3f99945238386bbfa19cdd9ad4cebc41.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f99945238386bbfa19cdd9ad4cebc41.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3f99945238386bbfa19cdd9ad4cebc41.exe
-
Size
1.1MB
-
MD5
3f99945238386bbfa19cdd9ad4cebc41
-
SHA1
3e9e510176bfa033526217f21b514b252197ed9b
-
SHA256
20d83654ce60e098ca535daf03e8e3dd70d428323592cd4ff562c420e12291a9
-
SHA512
c45512bf90f2464b52a663b47c6faa4791ac30bbddec8c90029d42b45b45916e46be268ea8e69b4927615250a9c984e720def135e04452485e53770cf1076334
-
SSDEEP
24576:4WvknOMEfzMflkqhA08WhmH07cQgfeNZNor50brdoG22v+m:4UeOMmykqetWhj7cQceNZ1doG22v+m
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3512 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 3512 1036 3f99945238386bbfa19cdd9ad4cebc41.exe 17 PID 1036 wrote to memory of 3512 1036 3f99945238386bbfa19cdd9ad4cebc41.exe 17 PID 1036 wrote to memory of 3512 1036 3f99945238386bbfa19cdd9ad4cebc41.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f99945238386bbfa19cdd9ad4cebc41.exe"C:\Users\Admin\AppData\Local\Temp\3f99945238386bbfa19cdd9ad4cebc41.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\a2DXPAD3tM\Z1VKpH8t\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2DXPAD3tM\Z1VKpH8t\Setup.exe --relaunch2⤵
- Executes dropped EXE
PID:3512
-