Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 23:03
Behavioral task
behavioral1
Sample
fea59794e625505985a57e2a6bad0af5.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
fea59794e625505985a57e2a6bad0af5.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
fea59794e625505985a57e2a6bad0af5.exe
-
Size
56KB
-
MD5
fea59794e625505985a57e2a6bad0af5
-
SHA1
596932071cdec56e00791821b5bbc98de1850801
-
SHA256
78b350edf85e9fd40ebe0d89de0307672a60e34a79d38305e9ec5c056c28d821
-
SHA512
017e1c876e85847640d6526a49c8c90397b179331f763592532c87a348bfda83f7dbb6faf5b98ce43791bc0dce695d43680bd42873711ebfe4bedf2a0b5da7cb
-
SSDEEP
1536:2A++pG8oumY7l6/Lyy8SbN6uoAmsItTl7lnYH2r8AtKYvT:r9G8WFezBT5lYAcY7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1204 fea59794e625505985a57e2a6bad0af5.exe -
Executes dropped EXE 1 IoCs
pid Process 1204 fea59794e625505985a57e2a6bad0af5.exe -
resource yara_rule behavioral2/memory/792-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/1204-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 792 fea59794e625505985a57e2a6bad0af5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 792 fea59794e625505985a57e2a6bad0af5.exe 1204 fea59794e625505985a57e2a6bad0af5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 1204 792 fea59794e625505985a57e2a6bad0af5.exe 20 PID 792 wrote to memory of 1204 792 fea59794e625505985a57e2a6bad0af5.exe 20 PID 792 wrote to memory of 1204 792 fea59794e625505985a57e2a6bad0af5.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea59794e625505985a57e2a6bad0af5.exe"C:\Users\Admin\AppData\Local\Temp\fea59794e625505985a57e2a6bad0af5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\fea59794e625505985a57e2a6bad0af5.exeC:\Users\Admin\AppData\Local\Temp\fea59794e625505985a57e2a6bad0af5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1204
-