Analysis
-
max time kernel
144s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:45
Behavioral task
behavioral1
Sample
60d5f707374cb5b850b52f4d157b80d4.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
60d5f707374cb5b850b52f4d157b80d4.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
60d5f707374cb5b850b52f4d157b80d4.exe
-
Size
1.3MB
-
MD5
60d5f707374cb5b850b52f4d157b80d4
-
SHA1
0f926d3fa193c6a00287d59152df8222d577f56d
-
SHA256
d7e3d847dfe0c0d00bef2aae3e7b5101b9a5a908a3831e39c4f3aaffec14f161
-
SHA512
852ed702ea292297980f14ae45bb67f8e82968f30ce7b420822999cc7f0a2a2eb583595bfb23a616e5854d454973da21b20732510fb280800eef3722dc3f2e99
-
SSDEEP
24576:RQmuNdip4LXISpPTp/4DrqBmI/FuLNFgKLU4DOUALGWPVfUyFJaxW8BQuvBlgx4u:am64gdJTpkrqBFmgK4YOUALGgVfUyDaV
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4596 60d5f707374cb5b850b52f4d157b80d4.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 60d5f707374cb5b850b52f4d157b80d4.exe -
resource yara_rule behavioral2/memory/756-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/4596-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 756 60d5f707374cb5b850b52f4d157b80d4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 756 60d5f707374cb5b850b52f4d157b80d4.exe 4596 60d5f707374cb5b850b52f4d157b80d4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 756 wrote to memory of 4596 756 60d5f707374cb5b850b52f4d157b80d4.exe 17 PID 756 wrote to memory of 4596 756 60d5f707374cb5b850b52f4d157b80d4.exe 17 PID 756 wrote to memory of 4596 756 60d5f707374cb5b850b52f4d157b80d4.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d5f707374cb5b850b52f4d157b80d4.exe"C:\Users\Admin\AppData\Local\Temp\60d5f707374cb5b850b52f4d157b80d4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\60d5f707374cb5b850b52f4d157b80d4.exeC:\Users\Admin\AppData\Local\Temp\60d5f707374cb5b850b52f4d157b80d4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4596
-