Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:56
Behavioral task
behavioral1
Sample
d043b06748fc659e5237ce50e33242c9.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
d043b06748fc659e5237ce50e33242c9.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
d043b06748fc659e5237ce50e33242c9.exe
-
Size
5.8MB
-
MD5
d043b06748fc659e5237ce50e33242c9
-
SHA1
77fa5d49726e8530ed0d74ef698deead888f4ffb
-
SHA256
8489009e89db4282e5927c75d81c15f853e7a01a317785b6a73a89daa092706e
-
SHA512
e858eb1187224a2d43c779822fdf753b9f7ceb6a267ae0d689b2bc2ab8a89ecac7ecbf6372f1d56da4796cf6404d10dd93e8ddbb4f57af0306bf1616931ff0a9
-
SSDEEP
98304:uLbXWMq53fSqTpOkfzMfY3/xHdQu6VrzwjMXPnfzMfY3/xHdQu6V:uvGZ3f1I8P3pdQzzRPrP3pdQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4908 d043b06748fc659e5237ce50e33242c9.exe -
Executes dropped EXE 1 IoCs
pid Process 4908 d043b06748fc659e5237ce50e33242c9.exe -
resource yara_rule behavioral2/memory/1904-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1904 d043b06748fc659e5237ce50e33242c9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1904 d043b06748fc659e5237ce50e33242c9.exe 4908 d043b06748fc659e5237ce50e33242c9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1904 wrote to memory of 4908 1904 d043b06748fc659e5237ce50e33242c9.exe 17 PID 1904 wrote to memory of 4908 1904 d043b06748fc659e5237ce50e33242c9.exe 17 PID 1904 wrote to memory of 4908 1904 d043b06748fc659e5237ce50e33242c9.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\d043b06748fc659e5237ce50e33242c9.exe"C:\Users\Admin\AppData\Local\Temp\d043b06748fc659e5237ce50e33242c9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\d043b06748fc659e5237ce50e33242c9.exeC:\Users\Admin\AppData\Local\Temp\d043b06748fc659e5237ce50e33242c9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4908
-