Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 20:41

General

  • Target

    3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe

  • Size

    223KB

  • MD5

    cc6f609429a9b8e9d8d219043d3bcb3d

  • SHA1

    5e97db48a9a27207acb43c7375d48aed775dd3d9

  • SHA256

    3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb

  • SHA512

    8edd31737b357ea2d0cf542a64bb3fbb4534e3ba798dae74729ab419eed989d2e6d36f6a69b217900c72796e95f2855407a82eebd7d3e63bc048712427ae8ec0

  • SSDEEP

    6144:UIve6ZsqJM8dyO6WXKGHaN64aMw9G4VwpOv0JgkmUWd:UUZJME3cGx4l42pOv4goWd

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
    "C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
      C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe

    Filesize

    223KB

    MD5

    f62a362219ced1f428a2cb706e9e6386

    SHA1

    80febc0a25e12862c698df1b6c029ec4ae7688a6

    SHA256

    130387d11210ca2d706ff0c1da66718bdd01c988ee689342d3c82794139097f9

    SHA512

    0b9a5bbe2a84f8712e828594e505e18171fafe96e396f2d703f15a700ad70f7f97fd34f6672629e726e324e0d8c397bbe3bb707af9b555c0686d345f92c942c3

  • memory/2108-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2108-10-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2108-8-0x0000000000310000-0x0000000000356000-memory.dmp

    Filesize

    280KB

  • memory/2416-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2416-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2416-16-0x0000000000160000-0x00000000001A6000-memory.dmp

    Filesize

    280KB