Analysis
-
max time kernel
148s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:42
Behavioral task
behavioral1
Sample
aa8335713bd38683262e2edf99a73bb8.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa8335713bd38683262e2edf99a73bb8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
aa8335713bd38683262e2edf99a73bb8.exe
-
Size
11.7MB
-
MD5
aa8335713bd38683262e2edf99a73bb8
-
SHA1
f4a99a6dba901492dac4b254b90e702c574a6397
-
SHA256
dd322cb3b5537fd457d982a8f31e6ce8f762ef0303fefec0906db88278716358
-
SHA512
e8c418a064b114af1c675f37278143fcd4b60524280c7aefb8b6b376f47b7a3f988e6d4e7ae8a19fb1d8a4f5db8d6adc10bac2a6d3033f116e5dc16a90bed7ce
-
SSDEEP
196608:nbtMnJ57xdqUdZ9gl/iBiP2pnpFegl/iBiPzuQqkKSnDGgl/iBiP2pnpFegl/iBg:E57xdqUZ92iPtpFe2iPkKSa2iPtpFe2i
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 208 aa8335713bd38683262e2edf99a73bb8.exe -
Executes dropped EXE 1 IoCs
pid Process 208 aa8335713bd38683262e2edf99a73bb8.exe -
resource yara_rule behavioral2/memory/208-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000c000000023165-11.dat upx behavioral2/memory/4192-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4192 aa8335713bd38683262e2edf99a73bb8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4192 aa8335713bd38683262e2edf99a73bb8.exe 208 aa8335713bd38683262e2edf99a73bb8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 208 4192 aa8335713bd38683262e2edf99a73bb8.exe 22 PID 4192 wrote to memory of 208 4192 aa8335713bd38683262e2edf99a73bb8.exe 22 PID 4192 wrote to memory of 208 4192 aa8335713bd38683262e2edf99a73bb8.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa8335713bd38683262e2edf99a73bb8.exe"C:\Users\Admin\AppData\Local\Temp\aa8335713bd38683262e2edf99a73bb8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\aa8335713bd38683262e2edf99a73bb8.exeC:\Users\Admin\AppData\Local\Temp\aa8335713bd38683262e2edf99a73bb8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:208
-