Analysis
-
max time kernel
35s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:57
Behavioral task
behavioral1
Sample
1f2a492fe2133e075cfc897eac32d3b8.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f2a492fe2133e075cfc897eac32d3b8.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1f2a492fe2133e075cfc897eac32d3b8.exe
-
Size
133KB
-
MD5
1f2a492fe2133e075cfc897eac32d3b8
-
SHA1
ce2dd17c77aae9af61babf3ea67d6090175408d8
-
SHA256
efb600234814a78a65eca7d65cc2faca20ff8474a6fe1ffdbf7935907ca9cb43
-
SHA512
fd2c9aeb69ed7e842f8569bd4f035413717499363c04fb2476b7fa678ec54f57a5df720297475dc76317a67e29480985bbb0a094befa8ffd5bac921416c5ab39
-
SSDEEP
3072:0aNGeAe06av2rP1QaNZfxMUsgm9jWlKhsY4BMcKrQZFwlQEnfVPTNQ:DNRAqaOrP1QIfxJy9sFjWYw+OdrNQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4956 1f2a492fe2133e075cfc897eac32d3b8.exe -
Executes dropped EXE 1 IoCs
pid Process 4956 1f2a492fe2133e075cfc897eac32d3b8.exe -
resource yara_rule behavioral2/memory/2876-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4956-13-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2876 1f2a492fe2133e075cfc897eac32d3b8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2876 1f2a492fe2133e075cfc897eac32d3b8.exe 4956 1f2a492fe2133e075cfc897eac32d3b8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4956 2876 1f2a492fe2133e075cfc897eac32d3b8.exe 93 PID 2876 wrote to memory of 4956 2876 1f2a492fe2133e075cfc897eac32d3b8.exe 93 PID 2876 wrote to memory of 4956 2876 1f2a492fe2133e075cfc897eac32d3b8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f2a492fe2133e075cfc897eac32d3b8.exe"C:\Users\Admin\AppData\Local\Temp\1f2a492fe2133e075cfc897eac32d3b8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\1f2a492fe2133e075cfc897eac32d3b8.exeC:\Users\Admin\AppData\Local\Temp\1f2a492fe2133e075cfc897eac32d3b8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4956
-