Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 14:52
Behavioral task
behavioral1
Sample
d3c9447e9f6659b18ac349b52235ecb8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d3c9447e9f6659b18ac349b52235ecb8.exe
Resource
win10v2004-20240226-en
General
-
Target
d3c9447e9f6659b18ac349b52235ecb8.exe
-
Size
2.9MB
-
MD5
d3c9447e9f6659b18ac349b52235ecb8
-
SHA1
9ce7773ef7c3507828363cab898613b1e8c60759
-
SHA256
edaaa97879681fec78b50bd39fb5755021d52b805c73aaee9924aae3f2f7f8a7
-
SHA512
be2b8be3aee2651a5fb93eab8cdde1865ee53727a405712a787574b202d6326e68a590ab37a3e10f8b81355465b7af4ee5c50a52f94fbafb48c293e2f338e1e3
-
SSDEEP
49152:SaEH33e2AUADqCUC5+wFVEmacAP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:o33t6gs+HfcAgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 d3c9447e9f6659b18ac349b52235ecb8.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 d3c9447e9f6659b18ac349b52235ecb8.exe -
Loads dropped DLL 1 IoCs
pid Process 3036 d3c9447e9f6659b18ac349b52235ecb8.exe -
resource yara_rule behavioral1/memory/3036-1-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a0000000143fb-10.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3036 d3c9447e9f6659b18ac349b52235ecb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3036 d3c9447e9f6659b18ac349b52235ecb8.exe 2944 d3c9447e9f6659b18ac349b52235ecb8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2944 3036 d3c9447e9f6659b18ac349b52235ecb8.exe 28 PID 3036 wrote to memory of 2944 3036 d3c9447e9f6659b18ac349b52235ecb8.exe 28 PID 3036 wrote to memory of 2944 3036 d3c9447e9f6659b18ac349b52235ecb8.exe 28 PID 3036 wrote to memory of 2944 3036 d3c9447e9f6659b18ac349b52235ecb8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c9447e9f6659b18ac349b52235ecb8.exe"C:\Users\Admin\AppData\Local\Temp\d3c9447e9f6659b18ac349b52235ecb8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\d3c9447e9f6659b18ac349b52235ecb8.exeC:\Users\Admin\AppData\Local\Temp\d3c9447e9f6659b18ac349b52235ecb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD54d822d25ebdaa51f269a42398fd63623
SHA10448ec019b7a27f188267c30e3bc6dddb75db033
SHA25659fb1f697ee802a71f5bd3c528d81fdb9be8b64362adf6d255b3aacadb350852
SHA5126e1eaf08449fd4952977306e057f0e8def791e4c4cf053f81d1f83bd88159d491363df96e43327d9b6460d5ebdbbd32f081660a4f809d8fa499865d5eb6f4c05