Analysis
-
max time kernel
2s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 02:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3faae1a35e56848955a1a75c5ee5133f.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3faae1a35e56848955a1a75c5ee5133f.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3faae1a35e56848955a1a75c5ee5133f.exe
-
Size
907KB
-
MD5
3faae1a35e56848955a1a75c5ee5133f
-
SHA1
9998c942fbedaecd027d910a4ca2b634c9b714fa
-
SHA256
17697422faa8ceb2b14f0439a82480f5b33bd28651040d1a70017dbbc7845339
-
SHA512
084bc0909cbdacf25d04e4fc1a6537680d7906544116851cab674a1bebc208c5fcd2e84f515845c85db5ff245b9ff5e092f729187e51e7370121c77dd1542833
-
SSDEEP
24576:r9gX5KgTBfs0A+3xnBjV4+jomN4Ta/ZS1:rhCRsqxnI+s+4TgS
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2720 3faae1a35e56848955a1a75c5ee5133f.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 3faae1a35e56848955a1a75c5ee5133f.exe -
Loads dropped DLL 1 IoCs
pid Process 2444 3faae1a35e56848955a1a75c5ee5133f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2444 3faae1a35e56848955a1a75c5ee5133f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2444 3faae1a35e56848955a1a75c5ee5133f.exe 2720 3faae1a35e56848955a1a75c5ee5133f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2720 2444 3faae1a35e56848955a1a75c5ee5133f.exe 18 PID 2444 wrote to memory of 2720 2444 3faae1a35e56848955a1a75c5ee5133f.exe 18 PID 2444 wrote to memory of 2720 2444 3faae1a35e56848955a1a75c5ee5133f.exe 18 PID 2444 wrote to memory of 2720 2444 3faae1a35e56848955a1a75c5ee5133f.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3faae1a35e56848955a1a75c5ee5133f.exe"C:\Users\Admin\AppData\Local\Temp\3faae1a35e56848955a1a75c5ee5133f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3faae1a35e56848955a1a75c5ee5133f.exeC:\Users\Admin\AppData\Local\Temp\3faae1a35e56848955a1a75c5ee5133f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2720
-