Analysis
-
max time kernel
145s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50d8804cf3b2099aba8eda90c72a0791.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
50d8804cf3b2099aba8eda90c72a0791.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
50d8804cf3b2099aba8eda90c72a0791.exe
-
Size
907KB
-
MD5
50d8804cf3b2099aba8eda90c72a0791
-
SHA1
ab4a2703809224b25cf92e7a934ad7bc08d29cb7
-
SHA256
847fb0842681a461bc0520fed8f7e61caaf9aac38691d325543432bae036a972
-
SHA512
ae9149e8b39b967f95f3b12e978a723a1ca842efdabe1164e4404372ce76f4f157d5a90a67aa2834842cb793e668007978dc98a6417a516ec5473f9110b2e1d0
-
SSDEEP
24576:/71YPOLZHeyPK0DjXE5RllwfInpo3aezzGBa/ZS1:/gAHLzv6ueuaeziBgS
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4456 50d8804cf3b2099aba8eda90c72a0791.exe -
Executes dropped EXE 1 IoCs
pid Process 4456 50d8804cf3b2099aba8eda90c72a0791.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1528 50d8804cf3b2099aba8eda90c72a0791.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1528 50d8804cf3b2099aba8eda90c72a0791.exe 4456 50d8804cf3b2099aba8eda90c72a0791.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4456 1528 50d8804cf3b2099aba8eda90c72a0791.exe 18 PID 1528 wrote to memory of 4456 1528 50d8804cf3b2099aba8eda90c72a0791.exe 18 PID 1528 wrote to memory of 4456 1528 50d8804cf3b2099aba8eda90c72a0791.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\50d8804cf3b2099aba8eda90c72a0791.exe"C:\Users\Admin\AppData\Local\Temp\50d8804cf3b2099aba8eda90c72a0791.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\50d8804cf3b2099aba8eda90c72a0791.exeC:\Users\Admin\AppData\Local\Temp\50d8804cf3b2099aba8eda90c72a0791.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4456
-