Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Resource
win10v2004-20240508-en
General
-
Target
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
-
Size
223KB
-
MD5
cc6f609429a9b8e9d8d219043d3bcb3d
-
SHA1
5e97db48a9a27207acb43c7375d48aed775dd3d9
-
SHA256
3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb
-
SHA512
8edd31737b357ea2d0cf542a64bb3fbb4534e3ba798dae74729ab419eed989d2e6d36f6a69b217900c72796e95f2855407a82eebd7d3e63bc048712427ae8ec0
-
SSDEEP
6144:UIve6ZsqJM8dyO6WXKGHaN64aMw9G4VwpOv0JgkmUWd:UUZJME3cGx4l42pOv4goWd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2416 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2416 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 29 PID 2108 wrote to memory of 2416 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 29 PID 2108 wrote to memory of 2416 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 29 PID 2108 wrote to memory of 2416 2108 3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe"C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exeC:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3d3de26239356fd97bcf46873c461cda733e751b35c84bf007dab50464fe92eb.exe
Filesize223KB
MD5f62a362219ced1f428a2cb706e9e6386
SHA180febc0a25e12862c698df1b6c029ec4ae7688a6
SHA256130387d11210ca2d706ff0c1da66718bdd01c988ee689342d3c82794139097f9
SHA5120b9a5bbe2a84f8712e828594e505e18171fafe96e396f2d703f15a700ad70f7f97fd34f6672629e726e324e0d8c397bbe3bb707af9b555c0686d345f92c942c3