Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
3GPDemo-v3.6/3GPDemo.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3GPDemo-v3.6/3GPDemo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3GPDemo-v3.6/新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
3GPDemo-v3.6/新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
3GPDemo-v3.6/3GPDemo.exe
-
Size
10.4MB
-
MD5
8cb93ca04d848a41f5d471f2929837e2
-
SHA1
b8fa0b29fd0f5e7b43af8273b3b3bc137223dc93
-
SHA256
ec3c206503a5ab6c8bcb9e07be28f330b531308ef3d9bba0af5ff4e2724df944
-
SHA512
acb1fa97016ab7dce97155b1fed989635dbbf1938e61486cc52a3181c181472a3ae5f971ab3e2f7dd96447034826aabb8c2574a73a2a37ad2e52ce19d7005336
-
SSDEEP
196608:Qhp+37p22tcaMN9YzcwVyVfnmTWTH7KSxfpmCiNyboMp9e+K7lM:QSp2CRMNkZV4nmqhKybzpaJM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4616 3GPDemo.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4616 4480 3GPDemo.exe 90 PID 4480 wrote to memory of 4616 4480 3GPDemo.exe 90 PID 4480 wrote to memory of 4616 4480 3GPDemo.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3GPDemo-v3.6\3GPDemo.exe"C:\Users\Admin\AppData\Local\Temp\3GPDemo-v3.6\3GPDemo.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\is-8N6NU.tmp\3GPDemo.tmp"C:\Users\Admin\AppData\Local\Temp\is-8N6NU.tmp\3GPDemo.tmp" /SL5="$70116,10604785,52224,C:\Users\Admin\AppData\Local\Temp\3GPDemo-v3.6\3GPDemo.exe"2⤵
- Executes dropped EXE
PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662KB
MD5b45570ddb00885bfe9e878af91a90564
SHA166daf059333962a65735999e99eb868cf9d5e832
SHA25629fedae831f5b1704e5b53351cd6b8d33a21b7971894a9d0385895d7662e264f
SHA51284350f30f9372be749fa244190b7d35a02aa2ce1ded9b45d89c29135a384e1170a54ef1af7004836ab9c30770a44f7e085b0cb238786a6d93d7e8cdec993d768