Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
60f12649cc4946cc9974bc35073ed7d7.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
60f12649cc4946cc9974bc35073ed7d7.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
60f12649cc4946cc9974bc35073ed7d7.exe
-
Size
92KB
-
MD5
60f12649cc4946cc9974bc35073ed7d7
-
SHA1
16626c1d4fabc908b37e9a4d5d1cfaea66710296
-
SHA256
bd269da790f24dd1df7d236179eab223f1e38cc31aaa249d28f6a626c4f2a8d2
-
SHA512
55bf818412790f241050cb217f58ee907713861a60c8bd12bccaa16a45ecfb3e02310e871c085df384075bddb53e860f220761c2bd5b9afc9accef34c86841e2
-
SSDEEP
1536:/1K4EiJ540PZjgabwj2jHzS+jSt5j8vhxdjNJXGKDSEkzOraIZdjsa:dpd40Oas2j+1tl+jZ7nSEaSZRx
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4868 60f12649cc4946cc9974bc35073ed7d7.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4428 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4428 60f12649cc4946cc9974bc35073ed7d7.exe 4868 60f12649cc4946cc9974bc35073ed7d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4868 4428 60f12649cc4946cc9974bc35073ed7d7.exe 27 PID 4428 wrote to memory of 4868 4428 60f12649cc4946cc9974bc35073ed7d7.exe 27 PID 4428 wrote to memory of 4868 4428 60f12649cc4946cc9974bc35073ed7d7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe"C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exeC:\Users\Admin\AppData\Local\Temp\60f12649cc4946cc9974bc35073ed7d7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4868
-