Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 12:29
Behavioral task
behavioral1
Sample
d3838c6d2716d194419bd9970742852a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3838c6d2716d194419bd9970742852a.exe
Resource
win10v2004-20240226-en
General
-
Target
d3838c6d2716d194419bd9970742852a.exe
-
Size
5.3MB
-
MD5
d3838c6d2716d194419bd9970742852a
-
SHA1
c086641ad0ba52f23c746e7b6e52fb0053b7c576
-
SHA256
ccbfb30d407e3f88bcc56ab55a662571237846e13d0725f9a7e92416725a0c2b
-
SHA512
06085f77d6701774260026fdbda3fca54e593a7d63e33a6585c4dcb183c9c6468cf48e68317240fd9ecacb1e90fbab40770fed6716c8b52acb9db11850777553
-
SSDEEP
98304:5yKcLiOQQkZ7RRkcECfWPBhiqkrd7uwq6WGSRJ7SetBvwDIykfWPBhiqkrd7uwq3:5+erv3W9JhFkrrWGGJ/BvXykeJhFkrru
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 d3838c6d2716d194419bd9970742852a.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 d3838c6d2716d194419bd9970742852a.exe -
resource yara_rule behavioral2/memory/4072-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000400000002271f-11.dat upx behavioral2/memory/2208-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4072 d3838c6d2716d194419bd9970742852a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4072 d3838c6d2716d194419bd9970742852a.exe 2208 d3838c6d2716d194419bd9970742852a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 2208 4072 d3838c6d2716d194419bd9970742852a.exe 98 PID 4072 wrote to memory of 2208 4072 d3838c6d2716d194419bd9970742852a.exe 98 PID 4072 wrote to memory of 2208 4072 d3838c6d2716d194419bd9970742852a.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3838c6d2716d194419bd9970742852a.exe"C:\Users\Admin\AppData\Local\Temp\d3838c6d2716d194419bd9970742852a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\d3838c6d2716d194419bd9970742852a.exeC:\Users\Admin\AppData\Local\Temp\d3838c6d2716d194419bd9970742852a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:3684
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD512417bbdd501ef42013418d8e1641d52
SHA172d914d5e8288664bda5bd2d701d5b1640e739f2
SHA256f3c04f2663e8b498b4415ca3c5396ee3a2099d4f166af46b429c606225c94958
SHA5123454bad3b11047779ff1437f66676ba225d49f288a7eba5603dca1cc6d408615150a873548b4575f01e5b7a6a20878e6573f51aae88173d68072a41e741b9c00