Analysis
-
max time kernel
2s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:27
Behavioral task
behavioral1
Sample
1fffa0beaf109d841c96434eff0c3488.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1fffa0beaf109d841c96434eff0c3488.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
1fffa0beaf109d841c96434eff0c3488.exe
-
Size
133KB
-
MD5
1fffa0beaf109d841c96434eff0c3488
-
SHA1
9c6d85f6073a2b0794e62658ee69574805053cb8
-
SHA256
6ca589340480f13cf54d782fe05f28512c7f73b8b069b98339326bfd5b4c34db
-
SHA512
cbb8cb81f490f3af3434d4851d542650f5eae1d3cb52e7578b7bcaf1711cbba2890cfdd198131a1f08a9c39fdc980cef64fc6877b84fbcd136031ac74270edfd
-
SSDEEP
3072:UQcOd5mhAfHMzDNOgaOUxmNG/Xl6GHMGeco3PlgNJ9yZPY0GoQ:UQxd1MzDN82GMUMl3PluAPY3oQ
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 632 1fffa0beaf109d841c96434eff0c3488.exe -
Executes dropped EXE 1 IoCs
pid Process 632 1fffa0beaf109d841c96434eff0c3488.exe -
resource yara_rule behavioral2/memory/4284-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/632-15-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x0007000000023237-12.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4284 1fffa0beaf109d841c96434eff0c3488.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4284 1fffa0beaf109d841c96434eff0c3488.exe 632 1fffa0beaf109d841c96434eff0c3488.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4284 wrote to memory of 632 4284 1fffa0beaf109d841c96434eff0c3488.exe 19 PID 4284 wrote to memory of 632 4284 1fffa0beaf109d841c96434eff0c3488.exe 19 PID 4284 wrote to memory of 632 4284 1fffa0beaf109d841c96434eff0c3488.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fffa0beaf109d841c96434eff0c3488.exe"C:\Users\Admin\AppData\Local\Temp\1fffa0beaf109d841c96434eff0c3488.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\1fffa0beaf109d841c96434eff0c3488.exeC:\Users\Admin\AppData\Local\Temp\1fffa0beaf109d841c96434eff0c3488.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:632
-