Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08db7cb111f51018ea49d0076fbd4385.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
08db7cb111f51018ea49d0076fbd4385.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
08db7cb111f51018ea49d0076fbd4385.exe
-
Size
385KB
-
MD5
08db7cb111f51018ea49d0076fbd4385
-
SHA1
51c62e0728a4a3a082e55a288e8c6b61c6b8bd22
-
SHA256
38eec03f515a93b39eed898bf79fdef05373fd1cf82d52d96b0ad7b048210d38
-
SHA512
0d645b2503989a5f5cf06e2d9d2ea22fba4074dec5ce13ea3eccfa3dd189eae262fbd9f146438cab0dffb2adcf363e5bbf92106bffbd4155efd268e3ddf27590
-
SSDEEP
6144:yxcku8JW5rGlGN6pp55iMTUrODlx5hp6GNPXwFrujQ1nM2Ml8Pc1B:yuku4W5rGcNY5AMTUWzNPXpQ1M2Ml+8B
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1576 08db7cb111f51018ea49d0076fbd4385.exe -
Executes dropped EXE 1 IoCs
pid Process 1576 08db7cb111f51018ea49d0076fbd4385.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 396 08db7cb111f51018ea49d0076fbd4385.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 396 08db7cb111f51018ea49d0076fbd4385.exe 1576 08db7cb111f51018ea49d0076fbd4385.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 1576 396 08db7cb111f51018ea49d0076fbd4385.exe 18 PID 396 wrote to memory of 1576 396 08db7cb111f51018ea49d0076fbd4385.exe 18 PID 396 wrote to memory of 1576 396 08db7cb111f51018ea49d0076fbd4385.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\08db7cb111f51018ea49d0076fbd4385.exe"C:\Users\Admin\AppData\Local\Temp\08db7cb111f51018ea49d0076fbd4385.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\08db7cb111f51018ea49d0076fbd4385.exeC:\Users\Admin\AppData\Local\Temp\08db7cb111f51018ea49d0076fbd4385.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1576
-