Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0f8539cad48931532bdb9bc0a22a59cc.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f8539cad48931532bdb9bc0a22a59cc.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
0f8539cad48931532bdb9bc0a22a59cc.exe
-
Size
907KB
-
MD5
0f8539cad48931532bdb9bc0a22a59cc
-
SHA1
591ea1686a561fe5e27edae2be7389d5a55addd8
-
SHA256
cfd7cc7233d13f635b92584cd571c68cf0dad14571fd3a30dfbfbda569c3ea4f
-
SHA512
e9d08de20cb24f8cf7ba153302e19c2395a17e6c9f8e12eccee5b957885a5138be4a51263d1892462393d81fa75712f8e0c525c1fc7713ce5dcd7269d7933656
-
SSDEEP
12288:KsAPpvtyKB60+k+vUC6zN9JLdIbspJTBusv9nA/u77QoEGjVDa/ZS1:8P1IS6pp6zNab0lhA8a/ZS1
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3536 0f8539cad48931532bdb9bc0a22a59cc.exe -
Executes dropped EXE 1 IoCs
pid Process 3536 0f8539cad48931532bdb9bc0a22a59cc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4148 0f8539cad48931532bdb9bc0a22a59cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4148 0f8539cad48931532bdb9bc0a22a59cc.exe 3536 0f8539cad48931532bdb9bc0a22a59cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3536 4148 0f8539cad48931532bdb9bc0a22a59cc.exe 22 PID 4148 wrote to memory of 3536 4148 0f8539cad48931532bdb9bc0a22a59cc.exe 22 PID 4148 wrote to memory of 3536 4148 0f8539cad48931532bdb9bc0a22a59cc.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8539cad48931532bdb9bc0a22a59cc.exe"C:\Users\Admin\AppData\Local\Temp\0f8539cad48931532bdb9bc0a22a59cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\0f8539cad48931532bdb9bc0a22a59cc.exeC:\Users\Admin\AppData\Local\Temp\0f8539cad48931532bdb9bc0a22a59cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3536
-