Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:34
Behavioral task
behavioral1
Sample
0346cadeca6f93407779f8d27e4c424f.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0346cadeca6f93407779f8d27e4c424f.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
0346cadeca6f93407779f8d27e4c424f.exe
-
Size
56KB
-
MD5
0346cadeca6f93407779f8d27e4c424f
-
SHA1
05aca9ae2c07a57b5f8fe069346e733bac2b0d14
-
SHA256
8e3355bf482f1d5dc2ad3a9abc69f4375bb198f8f10ee04f1380ad0c53cbfdbf
-
SHA512
5f3a1674e1fa04d9f46f8dad60492492f6e8c3109e936cbffcd8105ff2dc5bd34f5f54afc2bcf173f6e31f2a7e91a9465ff4d8bca3dba7f9952306d81f9d320f
-
SSDEEP
1536:xDgfR8cHBgcdDGfyUVSEyFmDcALkkaY7XnogrJlCi5PU1r:xeRjlUOv3Y7Xx9fi
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3316 0346cadeca6f93407779f8d27e4c424f.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 0346cadeca6f93407779f8d27e4c424f.exe -
resource yara_rule behavioral2/memory/4348-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3316-13-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4348 0346cadeca6f93407779f8d27e4c424f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4348 0346cadeca6f93407779f8d27e4c424f.exe 3316 0346cadeca6f93407779f8d27e4c424f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3316 4348 0346cadeca6f93407779f8d27e4c424f.exe 20 PID 4348 wrote to memory of 3316 4348 0346cadeca6f93407779f8d27e4c424f.exe 20 PID 4348 wrote to memory of 3316 4348 0346cadeca6f93407779f8d27e4c424f.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\0346cadeca6f93407779f8d27e4c424f.exe"C:\Users\Admin\AppData\Local\Temp\0346cadeca6f93407779f8d27e4c424f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\0346cadeca6f93407779f8d27e4c424f.exeC:\Users\Admin\AppData\Local\Temp\0346cadeca6f93407779f8d27e4c424f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3316
-