Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:02
Behavioral task
behavioral1
Sample
e5a314fbd675c3bd8041328357eb6beb.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
e5a314fbd675c3bd8041328357eb6beb.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
e5a314fbd675c3bd8041328357eb6beb.exe
-
Size
2.9MB
-
MD5
e5a314fbd675c3bd8041328357eb6beb
-
SHA1
29c610a3e3560149aab099073517591bbba93cf3
-
SHA256
20efc2d72be1ee08e55e0bbeb80f02f3ad0bccada3559892a5647f4f84c9c719
-
SHA512
7e106eccf8d699d06985eb943666381fb127d9a41e286f820fbf226118d91866aff6a7c08abd924e64c9e88eddcb25de5beea36672d8735b4d4da7a7d4db7be5
-
SSDEEP
49152:ByJyNRah3e5hXB+ZiwB/N74NH5HUyNRcUsCVOzetdZJ:5NRapSRxQ/4HBUCczzM3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1096 e5a314fbd675c3bd8041328357eb6beb.exe -
Executes dropped EXE 1 IoCs
pid Process 1096 e5a314fbd675c3bd8041328357eb6beb.exe -
resource yara_rule behavioral2/memory/3560-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/1096-14-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3560 e5a314fbd675c3bd8041328357eb6beb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3560 e5a314fbd675c3bd8041328357eb6beb.exe 1096 e5a314fbd675c3bd8041328357eb6beb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1096 3560 e5a314fbd675c3bd8041328357eb6beb.exe 19 PID 3560 wrote to memory of 1096 3560 e5a314fbd675c3bd8041328357eb6beb.exe 19 PID 3560 wrote to memory of 1096 3560 e5a314fbd675c3bd8041328357eb6beb.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5a314fbd675c3bd8041328357eb6beb.exe"C:\Users\Admin\AppData\Local\Temp\e5a314fbd675c3bd8041328357eb6beb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\e5a314fbd675c3bd8041328357eb6beb.exeC:\Users\Admin\AppData\Local\Temp\e5a314fbd675c3bd8041328357eb6beb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1096
-