Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:04
Behavioral task
behavioral1
Sample
52b9560cb65f179541b219ef1e5301bc.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
52b9560cb65f179541b219ef1e5301bc.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
52b9560cb65f179541b219ef1e5301bc.exe
-
Size
353KB
-
MD5
52b9560cb65f179541b219ef1e5301bc
-
SHA1
dfebd290451553b2d41136f8fdd8dccbda6940fa
-
SHA256
95d396301485fdc455b1065eb2da3058d213b53efd887afd227b41697453a0fd
-
SHA512
86f5b8d673da166530d10ff2354fe491db4f94f93b9542fabf1fb829aa5549b4e81933c07eb5dc844421f41788df77787327c19dc5051c29016938bda77cacb7
-
SSDEEP
6144:W/b97qOdNdwfSSXTIbNakgIGJM0pGY1WlgHMMCYdxfsLPrPwo+:W5qQdwfS+TIZPRGJM3yWWHGYTfmE
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1860 52b9560cb65f179541b219ef1e5301bc.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 52b9560cb65f179541b219ef1e5301bc.exe -
resource yara_rule behavioral2/memory/2684-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2684 52b9560cb65f179541b219ef1e5301bc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2684 52b9560cb65f179541b219ef1e5301bc.exe 1860 52b9560cb65f179541b219ef1e5301bc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1860 2684 52b9560cb65f179541b219ef1e5301bc.exe 22 PID 2684 wrote to memory of 1860 2684 52b9560cb65f179541b219ef1e5301bc.exe 22 PID 2684 wrote to memory of 1860 2684 52b9560cb65f179541b219ef1e5301bc.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe"C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exeC:\Users\Admin\AppData\Local\Temp\52b9560cb65f179541b219ef1e5301bc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1860
-