Analysis
-
max time kernel
116s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:59
Behavioral task
behavioral1
Sample
07cd03c458035787bf50189fb38f43a8.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
07cd03c458035787bf50189fb38f43a8.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
07cd03c458035787bf50189fb38f43a8.exe
-
Size
2.7MB
-
MD5
07cd03c458035787bf50189fb38f43a8
-
SHA1
30b820cc0757144eeef481ad9323caad358de490
-
SHA256
626422faa4a8aeda05c03ec473cfc64a283fc04603a38b6bdab108be81901e91
-
SHA512
3ca11f289085489a698e9d9b0ef1ed36d980bbe73ea7c94506b8544fdf8edb1341b486b41ebe66130478e8402bee2c7a2e394c216666c3fb199b016760a124ba
-
SSDEEP
49152:mgYAno8JdbmSNci5QQ+wbTovKxz1IxR9lGJtIeufVQE92XMp9yJ2ujVPl4WR9j:mgYAo8JdKSci57+wbTHx+HM/IemtEXMI
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 07cd03c458035787bf50189fb38f43a8.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 07cd03c458035787bf50189fb38f43a8.exe -
resource yara_rule behavioral2/memory/3248-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3248 07cd03c458035787bf50189fb38f43a8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3248 07cd03c458035787bf50189fb38f43a8.exe 1756 07cd03c458035787bf50189fb38f43a8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 1756 3248 07cd03c458035787bf50189fb38f43a8.exe 19 PID 3248 wrote to memory of 1756 3248 07cd03c458035787bf50189fb38f43a8.exe 19 PID 3248 wrote to memory of 1756 3248 07cd03c458035787bf50189fb38f43a8.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\07cd03c458035787bf50189fb38f43a8.exe"C:\Users\Admin\AppData\Local\Temp\07cd03c458035787bf50189fb38f43a8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\07cd03c458035787bf50189fb38f43a8.exeC:\Users\Admin\AppData\Local\Temp\07cd03c458035787bf50189fb38f43a8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1756
-