Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 12:01
Behavioral task
behavioral1
Sample
8a9d11140551f2f5e423f898c1d5c123.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a9d11140551f2f5e423f898c1d5c123.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
8a9d11140551f2f5e423f898c1d5c123.exe
-
Size
2.7MB
-
MD5
8a9d11140551f2f5e423f898c1d5c123
-
SHA1
11fa75d6004d94c80096f8095592aed71044c34f
-
SHA256
338fd831f6ef2966fa7a0cf3738d4238f32873ff3f8945f362da7ca2dc9d5988
-
SHA512
75f5b81bced85901b074234e29b6b7f80158d391f8ff3cfaae4f2873edcbc7215d64dba229aecf90a1deed9b9c8c8dc959024a327346d1be12d321ba4646d48a
-
SSDEEP
49152:OcqXBi2eamdH1dcIS1/tBNHMyrpehP61R92pnfodBmVSeiWujuJPcrSwGSa9R9j:GXsT/2N1xvpQP61HAnCBpeUj7SwGSKHj
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4516 8a9d11140551f2f5e423f898c1d5c123.exe -
Executes dropped EXE 1 IoCs
pid Process 4516 8a9d11140551f2f5e423f898c1d5c123.exe -
resource yara_rule behavioral2/memory/1384-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx behavioral2/files/0x000800000001e712-11.dat upx behavioral2/memory/4516-13-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1384 8a9d11140551f2f5e423f898c1d5c123.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1384 8a9d11140551f2f5e423f898c1d5c123.exe 4516 8a9d11140551f2f5e423f898c1d5c123.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4516 1384 8a9d11140551f2f5e423f898c1d5c123.exe 86 PID 1384 wrote to memory of 4516 1384 8a9d11140551f2f5e423f898c1d5c123.exe 86 PID 1384 wrote to memory of 4516 1384 8a9d11140551f2f5e423f898c1d5c123.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe"C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exeC:\Users\Admin\AppData\Local\Temp\8a9d11140551f2f5e423f898c1d5c123.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4516
-