Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:14
Behavioral task
behavioral1
Sample
33a6dcfe30a24109ec4698abf6682105.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
33a6dcfe30a24109ec4698abf6682105.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
33a6dcfe30a24109ec4698abf6682105.exe
-
Size
59KB
-
MD5
33a6dcfe30a24109ec4698abf6682105
-
SHA1
de29e5f5ae9082825ee874cac9269683509926c7
-
SHA256
f35bc16264ad0c4f82c5298ac3635424713291d15de823dc1c8f5e05b0067728
-
SHA512
f287fb505fbb8903138e66b7367b822fe8105069e9b8a0387e2aeb6faba0618e53b8efc160968e46bda292fab71f739f328a88979788d6300796f005ec9f2cc0
-
SSDEEP
1536:LxBa6SjS9x7AYRn7W30WxoDJo3H3w0GgZPqizZff:LLFp231+Q3z3D9H
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4420 33a6dcfe30a24109ec4698abf6682105.exe -
Executes dropped EXE 1 IoCs
pid Process 4420 33a6dcfe30a24109ec4698abf6682105.exe -
resource yara_rule behavioral2/memory/4772-0-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4772 33a6dcfe30a24109ec4698abf6682105.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4772 33a6dcfe30a24109ec4698abf6682105.exe 4420 33a6dcfe30a24109ec4698abf6682105.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4420 4772 33a6dcfe30a24109ec4698abf6682105.exe 22 PID 4772 wrote to memory of 4420 4772 33a6dcfe30a24109ec4698abf6682105.exe 22 PID 4772 wrote to memory of 4420 4772 33a6dcfe30a24109ec4698abf6682105.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a6dcfe30a24109ec4698abf6682105.exe"C:\Users\Admin\AppData\Local\Temp\33a6dcfe30a24109ec4698abf6682105.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\33a6dcfe30a24109ec4698abf6682105.exeC:\Users\Admin\AppData\Local\Temp\33a6dcfe30a24109ec4698abf6682105.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4420
-