Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:00
Behavioral task
behavioral1
Sample
1f42be9bad0e3186892701760899ae90.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f42be9bad0e3186892701760899ae90.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1f42be9bad0e3186892701760899ae90.exe
-
Size
1.3MB
-
MD5
1f42be9bad0e3186892701760899ae90
-
SHA1
d8f0ce0689899c52becd1e7b0d9b290e75f0fc63
-
SHA256
e4b338adb5988f89568dad5eb1f7ad6065ad36ffe431dc9e480c1876cc81dafd
-
SHA512
6782feb566e8e923262aa40c760daccdeef10f47979e4e647ac4c49d6967e9f6289ed80c3decc1983d21b940be144c123f14cefc20a7882bef85898e5f31e4fd
-
SSDEEP
24576:Ge8/rW159T0G99fE84yd7t6sz1EhgpNDOVFEBWUpRvG:G1/KWG99fE87d02EhgUF0Bp
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 788 1f42be9bad0e3186892701760899ae90.exe -
Executes dropped EXE 1 IoCs
pid Process 788 1f42be9bad0e3186892701760899ae90.exe -
resource yara_rule behavioral2/memory/1528-0-0x0000000000400000-0x000000000086A000-memory.dmp upx behavioral2/memory/788-15-0x0000000000400000-0x000000000086A000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1528 1f42be9bad0e3186892701760899ae90.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1528 1f42be9bad0e3186892701760899ae90.exe 788 1f42be9bad0e3186892701760899ae90.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 788 1528 1f42be9bad0e3186892701760899ae90.exe 21 PID 1528 wrote to memory of 788 1528 1f42be9bad0e3186892701760899ae90.exe 21 PID 1528 wrote to memory of 788 1528 1f42be9bad0e3186892701760899ae90.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f42be9bad0e3186892701760899ae90.exe"C:\Users\Admin\AppData\Local\Temp\1f42be9bad0e3186892701760899ae90.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\1f42be9bad0e3186892701760899ae90.exeC:\Users\Admin\AppData\Local\Temp\1f42be9bad0e3186892701760899ae90.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:788
-