Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08fbd0b2ad4cc097568a3e335038b148.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
08fbd0b2ad4cc097568a3e335038b148.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
08fbd0b2ad4cc097568a3e335038b148.exe
-
Size
771KB
-
MD5
08fbd0b2ad4cc097568a3e335038b148
-
SHA1
84db00013c0b619523b120c61a204ef0cf1600c3
-
SHA256
25ae3c6adceacac69fe19f844964ac9b9eb6d534b806c2072eb60a6e06828a70
-
SHA512
c38c0f5f6b0c98ebd92fd6bdcb5a48360f0dcdd6329949ce11b0cb692367500190cf8edad82686961c6cdf11c2b7e17c7497baab0ac915f0bbd9c5dc2448a99d
-
SSDEEP
12288:vd8eX4WNZDmeGFVlLmjakbizuazzF+b10VHmDXTuFaa2AtyGTKOF25ZoJJyhRgeG:l8q7qB0RHU+b10hJaothZ2/T6FBBB
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4924 08fbd0b2ad4cc097568a3e335038b148.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 08fbd0b2ad4cc097568a3e335038b148.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2176 08fbd0b2ad4cc097568a3e335038b148.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2176 08fbd0b2ad4cc097568a3e335038b148.exe 4924 08fbd0b2ad4cc097568a3e335038b148.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4924 2176 08fbd0b2ad4cc097568a3e335038b148.exe 20 PID 2176 wrote to memory of 4924 2176 08fbd0b2ad4cc097568a3e335038b148.exe 20 PID 2176 wrote to memory of 4924 2176 08fbd0b2ad4cc097568a3e335038b148.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\08fbd0b2ad4cc097568a3e335038b148.exe"C:\Users\Admin\AppData\Local\Temp\08fbd0b2ad4cc097568a3e335038b148.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\08fbd0b2ad4cc097568a3e335038b148.exeC:\Users\Admin\AppData\Local\Temp\08fbd0b2ad4cc097568a3e335038b148.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4924
-