Analysis
-
max time kernel
155s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
3ffdf6cc22098162d75e52d5900c291c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ffdf6cc22098162d75e52d5900c291c.exe
Resource
win10v2004-20231215-en
General
-
Target
3ffdf6cc22098162d75e52d5900c291c.exe
-
Size
82KB
-
MD5
3ffdf6cc22098162d75e52d5900c291c
-
SHA1
bf713f86dc6710267e77572c32f7bbddbbf25196
-
SHA256
b8fd905fb0a03d1f8cb738e260c4cea990dd7c51c26a2c75db14baa26e7b4063
-
SHA512
53a17a342b7ff3be3190cba2682517086ab100f1c789c3546382e77b44e0e6149f5b45b6191394d51edd72939748abb650a30335a41115fcfca3f6498e15012d
-
SSDEEP
1536:3H+xavbOklLZW63v87bjA5DGCt5tIs4GvGX30hVkmj7LFTFUYRh5:3aaDvc63rtXIzGvo30hVnVFUYV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1248 3ffdf6cc22098162d75e52d5900c291c.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 3ffdf6cc22098162d75e52d5900c291c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 3ffdf6cc22098162d75e52d5900c291c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2944 3ffdf6cc22098162d75e52d5900c291c.exe 1248 3ffdf6cc22098162d75e52d5900c291c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1248 2944 3ffdf6cc22098162d75e52d5900c291c.exe 96 PID 2944 wrote to memory of 1248 2944 3ffdf6cc22098162d75e52d5900c291c.exe 96 PID 2944 wrote to memory of 1248 2944 3ffdf6cc22098162d75e52d5900c291c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ffdf6cc22098162d75e52d5900c291c.exe"C:\Users\Admin\AppData\Local\Temp\3ffdf6cc22098162d75e52d5900c291c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3ffdf6cc22098162d75e52d5900c291c.exeC:\Users\Admin\AppData\Local\Temp\3ffdf6cc22098162d75e52d5900c291c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5df9b0164c474e3619d5b1df86b3e935e
SHA1f92b91f762a03ce82d12e987df5fdd4beb2da176
SHA2567b8254f2b74d122977c055fbdcc710c65290dcf4f19794b71652cbcbbf94bded
SHA5124692186e987660c8b7acdd6a903335ddfa94754ddf6f818b019384e6bbd8da4ce376ac93504bd49d5c7f7d2736a2522f52b8675cc61deacafc07cf91d7db1621